General

  • Target

    Remove Duplicates by xRisky v1.exe

  • Size

    547KB

  • Sample

    240805-xe665svdkr

  • MD5

    731e0addfe7c32066783fa33db494eff

  • SHA1

    29f628362813b3b03c1eaae29d8230c3bc4485ab

  • SHA256

    0d6d468d9d9595fc896559f15537a58bc006ebe8470fffcad933cede58731dbe

  • SHA512

    6dbb7fb9bb29c45011ad6017d3e7db928079888d85d9d32eef6b816e7350a49b5df3c47f7ae71ca2e829e95f3ecc2205dad48e29a011a71f557b44fdfa2ad949

  • SSDEEP

    12288:sfhF1ROYYCrqEp3fWhcueuF16B1ROmYnHglvlynf/y8:6cVMp3uRbF2EHgVlAf

Malware Config

Extracted

Family

redline

Botnet

UltimateCrackPack

C2

51.83.170.23:16128

Targets

    • Target

      Remove Duplicates by xRisky v1.exe

    • Size

      547KB

    • MD5

      731e0addfe7c32066783fa33db494eff

    • SHA1

      29f628362813b3b03c1eaae29d8230c3bc4485ab

    • SHA256

      0d6d468d9d9595fc896559f15537a58bc006ebe8470fffcad933cede58731dbe

    • SHA512

      6dbb7fb9bb29c45011ad6017d3e7db928079888d85d9d32eef6b816e7350a49b5df3c47f7ae71ca2e829e95f3ecc2205dad48e29a011a71f557b44fdfa2ad949

    • SSDEEP

      12288:sfhF1ROYYCrqEp3fWhcueuF16B1ROmYnHglvlynf/y8:6cVMp3uRbF2EHgVlAf

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks