General

  • Target

    5.exe

  • Size

    1.0MB

  • Sample

    240821-nnry5szcnm

  • MD5

    0b44599408e853d6a78cee99d6aff6fc

  • SHA1

    37dc7bb734e09e66790b013d7fd8e3ca92209784

  • SHA256

    3c72a7e322bf8655812487ecec1bbfb889635329159397a24aeab2bc9fb34d8a

  • SHA512

    eafa76fd5f7505c6636edc7f5fa32022073d1b563b7afaa429896a88fc181f7893531207b7fe80fbd34414a6a09598e0b1571deaee58c0aa40b724e22bf4491c

  • SSDEEP

    24576:xqDEvCTbMWu7rQYlBQcBiT6rprG8a021My+K+U1z+0h:xTvC/MTQYxsWR7a0eV1z+

Malware Config

Extracted

Family

redline

Botnet

Block

C2

162.218.211.195:4483

Targets

    • Target

      5.exe

    • Size

      1.0MB

    • MD5

      0b44599408e853d6a78cee99d6aff6fc

    • SHA1

      37dc7bb734e09e66790b013d7fd8e3ca92209784

    • SHA256

      3c72a7e322bf8655812487ecec1bbfb889635329159397a24aeab2bc9fb34d8a

    • SHA512

      eafa76fd5f7505c6636edc7f5fa32022073d1b563b7afaa429896a88fc181f7893531207b7fe80fbd34414a6a09598e0b1571deaee58c0aa40b724e22bf4491c

    • SSDEEP

      24576:xqDEvCTbMWu7rQYlBQcBiT6rprG8a021My+K+U1z+0h:xTvC/MTQYxsWR7a0eV1z+

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks