General

  • Target

    0x0007000000023433-50

  • Size

    705KB

  • Sample

    241015-vhsf2swbnb

  • MD5

    a3789c9b2a0bde3b59c7612879f8c9d4

  • SHA1

    a938c3009fcccaedd361ac52c6f53667c60fc82f

  • SHA256

    f338e5a346c8a6b3234270fc6e31e9232a37f80e18df9702f7dcf06dffeb969a

  • SHA512

    65255c566dcb5b441c1cd9e7a42400b3158bbc7ae8bfadcc76ecc0a75d6d75ac2be3fc03985afd9b7c9b08c2993564d9b4f52fd6896eeb8fa157be57822e4718

  • SSDEEP

    12288:WwHy90MAQMK4zypwqHsGIziL6v5H09sA7pjvSdXlyNBvMxX/Wmvc9nRh0rp:WwHyf0ypBzt2OeAxsXENBkx/WWc9nRh2

Malware Config

Extracted

Family

redline

Botnet

1

C2

193.203.203.82:63851

Targets

    • Target

      0x0007000000023433-50

    • Size

      705KB

    • MD5

      a3789c9b2a0bde3b59c7612879f8c9d4

    • SHA1

      a938c3009fcccaedd361ac52c6f53667c60fc82f

    • SHA256

      f338e5a346c8a6b3234270fc6e31e9232a37f80e18df9702f7dcf06dffeb969a

    • SHA512

      65255c566dcb5b441c1cd9e7a42400b3158bbc7ae8bfadcc76ecc0a75d6d75ac2be3fc03985afd9b7c9b08c2993564d9b4f52fd6896eeb8fa157be57822e4718

    • SSDEEP

      12288:WwHy90MAQMK4zypwqHsGIziL6v5H09sA7pjvSdXlyNBvMxX/Wmvc9nRh0rp:WwHyf0ypBzt2OeAxsXENBkx/WWc9nRh2

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks