General

  • Target

    30d31c8a72f67e34bbedc3d6fade478b913943dc7467c56dc81938272eef79a5

  • Size

    1.4MB

  • Sample

    240806-qngvaazgll

  • MD5

    d70eb78f0c8b90a0ece87c353a2ebb5e

  • SHA1

    cb328eaf56214d5335dac833e4c89c29de2d372f

  • SHA256

    30d31c8a72f67e34bbedc3d6fade478b913943dc7467c56dc81938272eef79a5

  • SHA512

    6f5be3370487fdeb189f56fc610c88a749dbe00ebe5a19dcdae21eb5648e0da86316b174fed7914eb5841baf03d19419238a6c4fa0203775beea94d4904eb1de

  • SSDEEP

    24576:gxcJspxHAYT3XVJlT7cpqOynkxZkW8tIkyrJv24/Yh3NW0zFdlR8rqW2xhSJ8R:g+azT3PlT7WdsTJOqtUiR

Malware Config

Extracted

Family

redline

Botnet

server.underground-cheat.xyz

C2

server.underground-cheat.xyz:1337

Targets

    • Target

      30d31c8a72f67e34bbedc3d6fade478b913943dc7467c56dc81938272eef79a5

    • Size

      1.4MB

    • MD5

      d70eb78f0c8b90a0ece87c353a2ebb5e

    • SHA1

      cb328eaf56214d5335dac833e4c89c29de2d372f

    • SHA256

      30d31c8a72f67e34bbedc3d6fade478b913943dc7467c56dc81938272eef79a5

    • SHA512

      6f5be3370487fdeb189f56fc610c88a749dbe00ebe5a19dcdae21eb5648e0da86316b174fed7914eb5841baf03d19419238a6c4fa0203775beea94d4904eb1de

    • SSDEEP

      24576:gxcJspxHAYT3XVJlT7cpqOynkxZkW8tIkyrJv24/Yh3NW0zFdlR8rqW2xhSJ8R:g+azT3PlT7WdsTJOqtUiR

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Indicator Removal: Clear Windows Event Logs

      Clear Windows Event Logs to hide the activity of an intrusion.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks