General

  • Target

    25c305d127aba1ca0802f96df1894c8b.bin

  • Size

    43KB

  • Sample

    240802-b3ldpaxhqk

  • MD5

    6f6b2f4a751734703a23d360b0572c27

  • SHA1

    e5d3242dc31eb8f3b0384ba98b377c9a605943db

  • SHA256

    7b46dadda1669480cf7efd536ac13b6836d19970a1037f81b5ed98bcc28f6c92

  • SHA512

    f373b87df1b807e650a8508eb687729747e50200c9685d13e8c4b142b46ea0bd5f830b5a8a25f997cd2e2c5f5f02820550cb18a9a3cc364bec27e73e64284061

  • SSDEEP

    768:yDtveBeU2oP9hf0hqiaDfygLyVlv6Zb6Xj6x/pXtWAkin3/nt+exJeazmfJ:WRSxlqKKNf6hNtWAk63/nAaifJ

Malware Config

Extracted

Family

redline

Botnet

svchost

C2

157.66.25.16:47818

Targets

    • Target

      eb30714b71fd1cc008d3fcbfee9735807527d6342a14c4898162ed48957d7650.exe

    • Size

      95KB

    • MD5

      25c305d127aba1ca0802f96df1894c8b

    • SHA1

      93f08869422ff5110f363fd62d457fff9a013718

    • SHA256

      eb30714b71fd1cc008d3fcbfee9735807527d6342a14c4898162ed48957d7650

    • SHA512

      72be8d364f22514cdf2d85e0addbd881074b36e4266d376b1485b27d7356a0d6e39af6a290894ea38bd0e079add2fe620d3594f0d71cd4f2a333ba7aaccf471b

    • SSDEEP

      1536:5qs+bqDylbG6jejoigIj43Ywzi0Zb78ivombfexv0ujXyyed2Y3tmulgS6p8l:XIwiYj+zi0ZbYe1g0ujyzdC8

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks