General

  • Target

    d3919ee38d414995b5d77f76c9491b60N.exe

  • Size

    472KB

  • Sample

    240803-y2kr4ayeme

  • MD5

    d3919ee38d414995b5d77f76c9491b60

  • SHA1

    364e9d763ac8c80efd6c84b9d44dcf7e79c88f7b

  • SHA256

    5e84bae5696d65f852746a39416bbf77e4af9c42562c9b945e49fb79d7f36e27

  • SHA512

    904630adf00fad47f145964b4823dc843cb0430a55143f02d41130e05ed86e9233871c09a1cb1a242cac3242ed21e82c6398b2a2c5f85c9333093e2141893969

  • SSDEEP

    12288:7pxiviXZ2egclzBK6BJZpWskPhIMjluC61XAnc:txlXZ2egcbK6BlWlhxaH

Malware Config

Extracted

Family

redline

Botnet

success-logs

C2

147.182.130.25:16383

Targets

    • Target

      d3919ee38d414995b5d77f76c9491b60N.exe

    • Size

      472KB

    • MD5

      d3919ee38d414995b5d77f76c9491b60

    • SHA1

      364e9d763ac8c80efd6c84b9d44dcf7e79c88f7b

    • SHA256

      5e84bae5696d65f852746a39416bbf77e4af9c42562c9b945e49fb79d7f36e27

    • SHA512

      904630adf00fad47f145964b4823dc843cb0430a55143f02d41130e05ed86e9233871c09a1cb1a242cac3242ed21e82c6398b2a2c5f85c9333093e2141893969

    • SSDEEP

      12288:7pxiviXZ2egclzBK6BJZpWskPhIMjluC61XAnc:txlXZ2egcbK6BlWlhxaH

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks