General

  • Target

    e4d67649c7704c50925bcd3fe6ac345cba54d118407f28f6550b398671b0284e.exe

  • Size

    95KB

  • Sample

    240805-cb94eatdpj

  • MD5

    4622038cc281fbc35d0cfce6c5a595e3

  • SHA1

    6f68e253ba656556e0eac9c4dafe6fdadb4c39f9

  • SHA256

    e4d67649c7704c50925bcd3fe6ac345cba54d118407f28f6550b398671b0284e

  • SHA512

    f5114998a7cfb51a7dec1477b2b3a026fd5a504ac9d4a16bb761ae09fe55074468944a5aaf7c66ed5c67aefdab2b62ca544a3b22ac7d245a0c9ffd11a8c298f3

  • SSDEEP

    1536:Oqs+EqJ8lbG6jejoigI/43Ywzi0Zb78ivombfexv0ujXyyed29teulgS6pc:sDukY/+zi0ZbYe1g0ujyzdZc

Malware Config

Extracted

Family

redline

Botnet

blackhatrussia.com clean

C2

51.89.201.41:29254

Targets

    • Target

      e4d67649c7704c50925bcd3fe6ac345cba54d118407f28f6550b398671b0284e.exe

    • Size

      95KB

    • MD5

      4622038cc281fbc35d0cfce6c5a595e3

    • SHA1

      6f68e253ba656556e0eac9c4dafe6fdadb4c39f9

    • SHA256

      e4d67649c7704c50925bcd3fe6ac345cba54d118407f28f6550b398671b0284e

    • SHA512

      f5114998a7cfb51a7dec1477b2b3a026fd5a504ac9d4a16bb761ae09fe55074468944a5aaf7c66ed5c67aefdab2b62ca544a3b22ac7d245a0c9ffd11a8c298f3

    • SSDEEP

      1536:Oqs+EqJ8lbG6jejoigI/43Ywzi0Zb78ivombfexv0ujXyyed29teulgS6pc:sDukY/+zi0ZbYe1g0ujyzdZc

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks