General

  • Target

    3868b32b9aeabdd021b9f5d029a741304def18fa3c19a0fe4872e82939aac02d.cmd

  • Size

    75KB

  • Sample

    241017-brrrbsxhjk

  • MD5

    832dd29f7ffd54f656233e56c588b4fd

  • SHA1

    fd306aaaa8b2065f80773cf440e245f3120eef09

  • SHA256

    3868b32b9aeabdd021b9f5d029a741304def18fa3c19a0fe4872e82939aac02d

  • SHA512

    b5098bc78bb21a8a003b2b5a1c4950ff3a791e9a8543be51c7885b95999a1acef6bdffda9bb92ca2734f8b0f54a1572d9fb3dbdba322abae2d1057273529be10

  • SSDEEP

    1536:udOgvVCMvAg6DhWpHjd62+6LiIB8KUDPGJ/oJzy:wVLAjDhWpjTfuPWIW

Malware Config

Extracted

Family

redline

Botnet

tony

C2

51.195.145.77:57942

Targets

    • Target

      3868b32b9aeabdd021b9f5d029a741304def18fa3c19a0fe4872e82939aac02d.cmd

    • Size

      75KB

    • MD5

      832dd29f7ffd54f656233e56c588b4fd

    • SHA1

      fd306aaaa8b2065f80773cf440e245f3120eef09

    • SHA256

      3868b32b9aeabdd021b9f5d029a741304def18fa3c19a0fe4872e82939aac02d

    • SHA512

      b5098bc78bb21a8a003b2b5a1c4950ff3a791e9a8543be51c7885b95999a1acef6bdffda9bb92ca2734f8b0f54a1572d9fb3dbdba322abae2d1057273529be10

    • SSDEEP

      1536:udOgvVCMvAg6DhWpHjd62+6LiIB8KUDPGJ/oJzy:wVLAjDhWpjTfuPWIW

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

MITRE ATT&CK Enterprise v15

Tasks