General

  • Target

    788006d305b062dfa22b0acf645493fb6ff8c97955d2cd53c89d0df8383dcf86.exe

  • Size

    537KB

  • Sample

    240731-bw8kmstfjf

  • MD5

    9954659fe9b70868e651001b52d17691

  • SHA1

    f2035cf1739bd6da81328cdf964f739fa9090110

  • SHA256

    788006d305b062dfa22b0acf645493fb6ff8c97955d2cd53c89d0df8383dcf86

  • SHA512

    1ac3216f2c3ff24186f565cef6af8816bcba1d96a2ffa9dc242390852db50fdc0411675618ed1d9ef17054fdab122cc6a91e9857805464d540e93ee83d8746ca

  • SSDEEP

    12288:HuASY+aZrwrZaOTUTpfS9PyzipZlYsbxI9WZw2i:h/4rEOWulpZlHbcWZG

Malware Config

Extracted

Family

redline

Botnet

eff123

C2

143.244.169.95:16383

Targets

    • Target

      788006d305b062dfa22b0acf645493fb6ff8c97955d2cd53c89d0df8383dcf86.exe

    • Size

      537KB

    • MD5

      9954659fe9b70868e651001b52d17691

    • SHA1

      f2035cf1739bd6da81328cdf964f739fa9090110

    • SHA256

      788006d305b062dfa22b0acf645493fb6ff8c97955d2cd53c89d0df8383dcf86

    • SHA512

      1ac3216f2c3ff24186f565cef6af8816bcba1d96a2ffa9dc242390852db50fdc0411675618ed1d9ef17054fdab122cc6a91e9857805464d540e93ee83d8746ca

    • SSDEEP

      12288:HuASY+aZrwrZaOTUTpfS9PyzipZlYsbxI9WZw2i:h/4rEOWulpZlHbcWZG

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks