General

  • Target

    Redeye Email Checker.exe

  • Size

    1.8MB

  • Sample

    240805-w665savarp

  • MD5

    ee91506ae8f5516e3db1a0931ea8843c

  • SHA1

    6862064d8a664626fd6d39e4d4c57d6c68ac245d

  • SHA256

    8b904606790976539fd73805d8a8283a30b67907bc35f7e98e3f679d500d0aca

  • SHA512

    d8bd0818dcdcf3904fb93af282c27f25607d980a5de18a4ff4081ecab43eee42408ba381e33531bdc5c261875b4076c214244c34d765cb0cd3f3351542cc1ae9

  • SSDEEP

    24576:SR+kTF4nMlM6O7PxpXkEX7L1Mfyx4AdGIBDA2d7/cqPfRtItNaFIJ0AwJyxWgZqe:++uKnzZVkS10AdGI9lvRt8PxWYskAD

Malware Config

Extracted

Family

redline

Botnet

UltimateCrackPack

C2

51.83.170.23:16128

Targets

    • Target

      Redeye Email Checker.exe

    • Size

      1.8MB

    • MD5

      ee91506ae8f5516e3db1a0931ea8843c

    • SHA1

      6862064d8a664626fd6d39e4d4c57d6c68ac245d

    • SHA256

      8b904606790976539fd73805d8a8283a30b67907bc35f7e98e3f679d500d0aca

    • SHA512

      d8bd0818dcdcf3904fb93af282c27f25607d980a5de18a4ff4081ecab43eee42408ba381e33531bdc5c261875b4076c214244c34d765cb0cd3f3351542cc1ae9

    • SSDEEP

      24576:SR+kTF4nMlM6O7PxpXkEX7L1Mfyx4AdGIBDA2d7/cqPfRtItNaFIJ0AwJyxWgZqe:++uKnzZVkS10AdGI9lvRt8PxWYskAD

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks