General

  • Target

    0cc658fb92f2b744889a57d27d8005b24ded16ae15f3d73789a8afbfb2591ae6

  • Size

    53KB

  • Sample

    241015-e2c8gayemr

  • MD5

    a8240bdfe38095fc68605ecbaf2907de

  • SHA1

    905fcb139ed538ef15f92fd24115e9a42c52e816

  • SHA256

    0cc658fb92f2b744889a57d27d8005b24ded16ae15f3d73789a8afbfb2591ae6

  • SHA512

    5a3466b80c93f35637f87b578f7e71470374aeb361b4d73f4432a45d76b6e0ed5e5f56f1ad2f801b9b8a4998dea135073edd32cf190cfb336fa8dc6d8fab14df

  • SSDEEP

    768:SesGCrUjc/i4pg1KRYa7a/TgT6R9ACuOL8QqnETPZRAGSiszCQKKleW/sVLUzqrh:8U4/hgXagCiTEErZYCQfsV95j

Malware Config

Extracted

Family

redline

Botnet

kay

C2

51.195.145.93:1886

Targets

    • Target

      Bank Account Confirmation.cmd

    • Size

      75KB

    • MD5

      283fbfbb411d1edabbe1cb21d366162e

    • SHA1

      47a59150aff544fb2a3d90288b5e8895c15aba47

    • SHA256

      44522dd5ad0f55465de4759cedae7ad4b88514df869bf1bf84cbec7d59fa5265

    • SHA512

      f389ebda3b62060045acf5cfbffa40957ec6c21cd061e3d6fb98e11528bc6e198a3fa1da0a552e10058e65fa2141d07f24c1b526f73c3cc8d93e9b1698f1738f

    • SSDEEP

      1536:3MnTcilr/sM2PyRzguf8qVL7MyjO4OxmmeLbXKxPpqFTi29tZL6c4:ITcilr07IkKl7qIXKRpqF+2w

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

MITRE ATT&CK Enterprise v15

Tasks