General

  • Target

    3a1085797ca3089008cb2b51d2fcdc84.exe

  • Size

    7KB

  • Sample

    241015-vwzsaawhmg

  • MD5

    3a1085797ca3089008cb2b51d2fcdc84

  • SHA1

    f5ea90ec6ad07f137c058ef2874dbd3a1b444f95

  • SHA256

    8fc221b7c8e3f52f22841c866cf0d842f2a1266e79b472273766ce1704474499

  • SHA512

    5e1cf172f3ad81c6bdc5bb3e75743a5a7ac4d4250012112888707a334f3336ba43b5aa71d4cf67f6aa3f8207e21460aa13d06524241e6d0ff9e4d9e7c05f0eac

  • SSDEEP

    96:/XE4Ok4l62wHEdMzsxPcVLpePDX6kNjNMhZrDXrFcAFrikDriSprimri4zNt:/XEdhvNlc526iNMhZrD7RFlLppN

Malware Config

Extracted

Family

redline

Botnet

7772121777

C2

87.120.127.223:42128

Targets

    • Target

      3a1085797ca3089008cb2b51d2fcdc84.exe

    • Size

      7KB

    • MD5

      3a1085797ca3089008cb2b51d2fcdc84

    • SHA1

      f5ea90ec6ad07f137c058ef2874dbd3a1b444f95

    • SHA256

      8fc221b7c8e3f52f22841c866cf0d842f2a1266e79b472273766ce1704474499

    • SHA512

      5e1cf172f3ad81c6bdc5bb3e75743a5a7ac4d4250012112888707a334f3336ba43b5aa71d4cf67f6aa3f8207e21460aa13d06524241e6d0ff9e4d9e7c05f0eac

    • SSDEEP

      96:/XE4Ok4l62wHEdMzsxPcVLpePDX6kNjNMhZrDXrFcAFrikDriSprimri4zNt:/XEdhvNlc526iNMhZrD7RFlLppN

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks