General

  • Target

    67b86881d4a9c885b15f09006a97d91aaeba361eca20dfae0ee206e7c4d30f6d

  • Size

    472KB

  • Sample

    241028-135vrsybne

  • MD5

    dc4312ebae5195179dcdc76ccd7444d6

  • SHA1

    1e496e4d9e379d226dff7f1190c21221ac5ab686

  • SHA256

    67b86881d4a9c885b15f09006a97d91aaeba361eca20dfae0ee206e7c4d30f6d

  • SHA512

    629343f527ff690405569e55e198beaaa8d1adb55699faf99d51ae0b7bebcb822472ffc9450dc2ee1e324e14f073c6c82d4d29c90a37fb664cc8fe3bcae8895a

  • SSDEEP

    12288:vij8icEWO7jdDlUDcXXxHhS03pOQfVN/IfSW78/F:vij8KOcRH8qpPH/IKWU

Malware Config

Extracted

Family

redline

Botnet

pee

C2

188.190.10.10:55123

Targets

    • Target

      QUOTATION#09678.exe

    • Size

      1.7MB

    • MD5

      92fa3cf6b7890df937fb45c0c5ec19cd

    • SHA1

      8d4664ddaa346f2f2f7cee30aa8089b053ed404c

    • SHA256

      b10245a0006dbd25079af51abd7cf48d195ce65d6f9f7b09e1cc52a3863fbac4

    • SHA512

      265f53aaaebecfc594f622ed68b99807400e118b60af51586ec803196b3af07234249df7834a3a9bad7fdea3a2c3cdf590b835e290cb73056bc68fc5c6214a48

    • SSDEEP

      12288:ooSDe4NfBlm9j6X6EVamHzhFfnINyZBpmU8Z:mS4Nf0j6X6E4mHNFfXBI7

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks