General

  • Target

    15102024_0112_Bank Account Confirmation.cmd.zip

  • Size

    53KB

  • Sample

    241015-bknfbszelq

  • MD5

    c540fa259026e3e853d1409f5d5e9d58

  • SHA1

    528a8b8751d5638190a717147a0989020afc2ef6

  • SHA256

    c8594a268c014caf03a4e6c0ee8369be1e4f8888129f10afbe66f41319a019ef

  • SHA512

    a080ff609c40f81c1f1a5f3f183bdb8c138c066a5190979cc814a1d5a99ffe3214f0e8fac640b332f5a439a522b45d625a231b106749ef7e7419ace78cc375ed

  • SSDEEP

    1536:1xrRtz9FtKHX293fiABf7LBUBUlleLbf0o7msO+PPt1UF:v/9OGDBqBy8Mb4u

Malware Config

Extracted

Family

redline

Botnet

kay

C2

51.195.145.93:1886

Targets

    • Target

      Bank Account Confirmation.cmd

    • Size

      75KB

    • MD5

      a1f610b023f0ee41cf49ff8f1c65cd69

    • SHA1

      9eb5aef9ec56315b68125fab688e7da0f1c047c7

    • SHA256

      b88f42d17c704ef4c967e9a1dc44df19c78f7778b4dd8b804d672bb8dc4b388b

    • SHA512

      9ac1b320dba8ad3e2649d536c7d5c2c00bf7e392c067f639cba722128e984f914920bb9a32502d27005359fcfb6e353c9f1a70eb421f158eb09fcadce8b4ee38

    • SSDEEP

      1536:ZVMZoZknhzcJZwc+ADr8syGShOY3C+BuRV0B/FHP3vfcC:AZvh+fDr7YuRg/FHvnd

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

MITRE ATT&CK Enterprise v15

Tasks