General

  • Target

    eb30714b71fd1cc008d3fcbfee9735807527d6342a14c4898162ed48957d7650.exe

  • Size

    95KB

  • Sample

    240801-ctltja1eph

  • MD5

    25c305d127aba1ca0802f96df1894c8b

  • SHA1

    93f08869422ff5110f363fd62d457fff9a013718

  • SHA256

    eb30714b71fd1cc008d3fcbfee9735807527d6342a14c4898162ed48957d7650

  • SHA512

    72be8d364f22514cdf2d85e0addbd881074b36e4266d376b1485b27d7356a0d6e39af6a290894ea38bd0e079add2fe620d3594f0d71cd4f2a333ba7aaccf471b

  • SSDEEP

    1536:5qs+bqDylbG6jejoigIj43Ywzi0Zb78ivombfexv0ujXyyed2Y3tmulgS6p8l:XIwiYj+zi0ZbYe1g0ujyzdC8

Malware Config

Extracted

Family

redline

Botnet

svchost

C2

157.66.25.16:47818

Targets

    • Target

      eb30714b71fd1cc008d3fcbfee9735807527d6342a14c4898162ed48957d7650.exe

    • Size

      95KB

    • MD5

      25c305d127aba1ca0802f96df1894c8b

    • SHA1

      93f08869422ff5110f363fd62d457fff9a013718

    • SHA256

      eb30714b71fd1cc008d3fcbfee9735807527d6342a14c4898162ed48957d7650

    • SHA512

      72be8d364f22514cdf2d85e0addbd881074b36e4266d376b1485b27d7356a0d6e39af6a290894ea38bd0e079add2fe620d3594f0d71cd4f2a333ba7aaccf471b

    • SSDEEP

      1536:5qs+bqDylbG6jejoigIj43Ywzi0Zb78ivombfexv0ujXyyed2Y3tmulgS6p8l:XIwiYj+zi0ZbYe1g0ujyzdC8

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks