General

  • Target

    556664b3dbcf66d7d831837a8ef6aed3bbaecb80867cf88ed85ceeff2e28f744.exe

  • Size

    1.0MB

  • Sample

    240806-b4cg6svhkm

  • MD5

    c621ad8d7905a5917267648416c59b8e

  • SHA1

    355b81d2c2e8ddffcdadf345a54f71d5ebbb74db

  • SHA256

    556664b3dbcf66d7d831837a8ef6aed3bbaecb80867cf88ed85ceeff2e28f744

  • SHA512

    6eebca3c512a99b5c8955f3fb01aa1f0eeb140e7adafb1dbf912326ce83fc18821609de674666c7c6b0ee30302cf986d1733d8482d6ef34e666b97a3430cd335

  • SSDEEP

    12288:CLlhhMfWpqUqirbod56PbTxItQBDAfdft+eLZjLP1gUrGqzw3+hOKuivRX62elU:02OgLibodkwWSJt/9rjz6+INivwy

Malware Config

Extracted

Family

redline

Botnet

UltimateCrackPack

C2

51.83.170.23:16128

Targets

    • Target

      556664b3dbcf66d7d831837a8ef6aed3bbaecb80867cf88ed85ceeff2e28f744.exe

    • Size

      1.0MB

    • MD5

      c621ad8d7905a5917267648416c59b8e

    • SHA1

      355b81d2c2e8ddffcdadf345a54f71d5ebbb74db

    • SHA256

      556664b3dbcf66d7d831837a8ef6aed3bbaecb80867cf88ed85ceeff2e28f744

    • SHA512

      6eebca3c512a99b5c8955f3fb01aa1f0eeb140e7adafb1dbf912326ce83fc18821609de674666c7c6b0ee30302cf986d1733d8482d6ef34e666b97a3430cd335

    • SSDEEP

      12288:CLlhhMfWpqUqirbod56PbTxItQBDAfdft+eLZjLP1gUrGqzw3+hOKuivRX62elU:02OgLibodkwWSJt/9rjz6+INivwy

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks