General

  • Target

    QUOTAZIONE00239-CGMCIGIEMME.exe

  • Size

    1010KB

  • Sample

    240805-q6gl8s1hmg

  • MD5

    a7656d5acb194230798f204f28d9c0ff

  • SHA1

    c45aed42a29aae84ae31420e3dca54923c22b096

  • SHA256

    3587f9b746ddb1588d27ff194157c4c9a82c38f171b6ce579c6972caa298ca13

  • SHA512

    84656f8b7c681407c7450de20f147d34049cd6529247f3831dfda633a05d41e9152726eba6989967237b30ec5291acba32e8b0cb50938738a78b1dd7eb61425d

  • SSDEEP

    12288:fDwmWzRWrLZD5NzZxi0JT+V7MFAtMl6ow5hSqG:fNKyV15Zxi1AAMW+qG

Malware Config

Extracted

Family

redline

Botnet

lovato

C2

57.128.132.216:55123

Targets

    • Target

      QUOTAZIONE00239-CGMCIGIEMME.exe

    • Size

      1010KB

    • MD5

      a7656d5acb194230798f204f28d9c0ff

    • SHA1

      c45aed42a29aae84ae31420e3dca54923c22b096

    • SHA256

      3587f9b746ddb1588d27ff194157c4c9a82c38f171b6ce579c6972caa298ca13

    • SHA512

      84656f8b7c681407c7450de20f147d34049cd6529247f3831dfda633a05d41e9152726eba6989967237b30ec5291acba32e8b0cb50938738a78b1dd7eb61425d

    • SSDEEP

      12288:fDwmWzRWrLZD5NzZxi0JT+V7MFAtMl6ow5hSqG:fNKyV15Zxi1AAMW+qG

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks