General

  • Target

    dd2bdb615eff30354ba6a94d817c183fddb311b865bf3e97c370e402acc789fa.exe

  • Size

    1.2MB

  • Sample

    240806-czst2awhrp

  • MD5

    b0171a35d97747c25578e7e4ce4e49ec

  • SHA1

    aadf5fcd323f63505f993108e700a24361ce1b82

  • SHA256

    dd2bdb615eff30354ba6a94d817c183fddb311b865bf3e97c370e402acc789fa

  • SHA512

    033039c1dd16fbea103de65a62918363603bcfcb42e9ccf473573c07a20971049a99c763d8a5a7abee659c215c1c51f3674aea3de1087bc9e5c06b3fb3a74873

  • SSDEEP

    24576:5yeATtmuSHfF1JR95/3wKgV/1vA3Yy4WQOJ:5MAF1H95/3avA+WjJ

Malware Config

Extracted

Family

redline

Botnet

UltimateCrackPack

C2

51.83.170.23:16128

Targets

    • Target

      dd2bdb615eff30354ba6a94d817c183fddb311b865bf3e97c370e402acc789fa.exe

    • Size

      1.2MB

    • MD5

      b0171a35d97747c25578e7e4ce4e49ec

    • SHA1

      aadf5fcd323f63505f993108e700a24361ce1b82

    • SHA256

      dd2bdb615eff30354ba6a94d817c183fddb311b865bf3e97c370e402acc789fa

    • SHA512

      033039c1dd16fbea103de65a62918363603bcfcb42e9ccf473573c07a20971049a99c763d8a5a7abee659c215c1c51f3674aea3de1087bc9e5c06b3fb3a74873

    • SSDEEP

      24576:5yeATtmuSHfF1JR95/3wKgV/1vA3Yy4WQOJ:5MAF1H95/3avA+WjJ

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks