General

  • Target

    01d452e81b85a3d399a247852f2f5004.bin

  • Size

    614KB

  • Sample

    241015-bcpcnavhlh

  • MD5

    ded4f5cc4ea43f237a6d922660f96715

  • SHA1

    40a3896818f3343b560b33df08964170837ec2e4

  • SHA256

    d3c126878bd5c77e080c3c30780234f7ce85547826f8a5a7d46f509d34ad09dc

  • SHA512

    538a050451a4f586edd34e95f0787d9421fcb944f7edd38885e6bd403e23f36d2c19c2d691c4c639d2b51c0896101d6147077db9dc7b9c43a822e61072f123f0

  • SSDEEP

    12288:LJk7Z/BGAXSh/m7FGj1htRKlsv3iYqrApFDowkR5spyW1z:1Aih/aFG5htR+Yqc/8w3pyWB

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

185.222.58.80:55615

Targets

    • Target

      88fd2273dba726f8e93082eef548564c84ee1f3be9f69a7d02ef9a3ed7f8ea18.exe

    • Size

      690KB

    • MD5

      01d452e81b85a3d399a247852f2f5004

    • SHA1

      b1b5bb7edf69875726ea1c627fb0bbef6215143a

    • SHA256

      88fd2273dba726f8e93082eef548564c84ee1f3be9f69a7d02ef9a3ed7f8ea18

    • SHA512

      d1f62c8a067f9d2a241cc4604883e41aa9860fd09719ba2827dd0f2de9920411e62b57b9ba7a1e5184736c473ba4d621e31a194224a513de66a2879131c8f9bb

    • SSDEEP

      12288:QPSg4dwyerVbCx3YNAguNN9WSrLuWXSAdVPOgOFHSLWB0io0CJohPCAOkR:2Sg4WrVbCx3YNhuNN9tW/A7OgOkQtC0V

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks