General

  • Target

    ef6721cf0bd7437d8bca647ead8f0120N.exe

  • Size

    95KB

  • Sample

    240804-qs46da1ang

  • MD5

    ef6721cf0bd7437d8bca647ead8f0120

  • SHA1

    7a2bd21a58d9a468380a47dfd81505b56cce613b

  • SHA256

    0ed605c6122fa4b3d84e89dd3dde7e3fca0aef0687935c1201f55d31a594d56b

  • SHA512

    70f28c80f7beebe6df040b07dcc782245d71a93102041c971c1cdfaeed2e8556fe3f641201486b7bbfbb30f6c511a678cf499328911a8c8d66ef2be16affb076

  • SSDEEP

    1536:9qs+NqLGlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed2oteulgS6pY:rqMOY3+zi0ZbYe1g0ujyzdoY

Malware Config

Extracted

Family

redline

Botnet

Second

C2

51.89.201.41:29254

Targets

    • Target

      ef6721cf0bd7437d8bca647ead8f0120N.exe

    • Size

      95KB

    • MD5

      ef6721cf0bd7437d8bca647ead8f0120

    • SHA1

      7a2bd21a58d9a468380a47dfd81505b56cce613b

    • SHA256

      0ed605c6122fa4b3d84e89dd3dde7e3fca0aef0687935c1201f55d31a594d56b

    • SHA512

      70f28c80f7beebe6df040b07dcc782245d71a93102041c971c1cdfaeed2e8556fe3f641201486b7bbfbb30f6c511a678cf499328911a8c8d66ef2be16affb076

    • SSDEEP

      1536:9qs+NqLGlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed2oteulgS6pY:rqMOY3+zi0ZbYe1g0ujyzdoY

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks