General

  • Target

    cfd967c789c68c41807d2d1424a7b3ba67d94834189750dc7b28da7513c4d0a5

  • Size

    512KB

  • Sample

    240805-dv1jrazarb

  • MD5

    438a600526521cbaf9727a2c6bf41eba

  • SHA1

    53b045ebc10a272380b0b48f8f7a3a96d2afd0b9

  • SHA256

    cfd967c789c68c41807d2d1424a7b3ba67d94834189750dc7b28da7513c4d0a5

  • SHA512

    118f2fe8636cf003c4eda3c3662d97bef1807d257d4d96f7ce167f350689f73d4651e9d5571da655bc2768ed0c4d1677eab183e5dcab935fe856208f0451ba49

  • SSDEEP

    12288:BDf4QK88rOmq8aEcW/3z4DZInH0P7x+DoJ:BcQKNOtPvD7F+C

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

billred229102.duckdns.org:26546

Targets

    • Target

      cfd967c789c68c41807d2d1424a7b3ba67d94834189750dc7b28da7513c4d0a5

    • Size

      512KB

    • MD5

      438a600526521cbaf9727a2c6bf41eba

    • SHA1

      53b045ebc10a272380b0b48f8f7a3a96d2afd0b9

    • SHA256

      cfd967c789c68c41807d2d1424a7b3ba67d94834189750dc7b28da7513c4d0a5

    • SHA512

      118f2fe8636cf003c4eda3c3662d97bef1807d257d4d96f7ce167f350689f73d4651e9d5571da655bc2768ed0c4d1677eab183e5dcab935fe856208f0451ba49

    • SSDEEP

      12288:BDf4QK88rOmq8aEcW/3z4DZInH0P7x+DoJ:BcQKNOtPvD7F+C

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Persistence

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Privilege Escalation

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

System Location Discovery

1
T1614

System Language Discovery

1
T1614.001

Tasks