General

  • Target

    5.exe

  • Size

    2.5MB

  • Sample

    241029-srfshawfmm

  • MD5

    60fbf5e1f59e35aac3fb573b1d136b07

  • SHA1

    f3ca4be74fcfc3b7eee2d6a000267ff543e9186a

  • SHA256

    c6452030b5c3054bc311e285ff98f147df2cd50898801cade4dc27974d54f357

  • SHA512

    82705fc4fbc8e9fa1152ea60afdd9cc6d0e9051b43b8b8f60874bba0d86c0a821c1d605c77ea48a3760a5b740f101ee7af00f74d8a10b3c4f6b9e5dab1a092e5

  • SSDEEP

    12288:mmqbNcTkr9j6uAuhwlZOipwR5EsGvFvcn5S5tW:WNcTMl6uv8ZhlRcnMjW

Malware Config

Extracted

Family

redline

Botnet

pee

C2

188.190.10.10:55123

Targets

    • Target

      5.exe

    • Size

      2.5MB

    • MD5

      60fbf5e1f59e35aac3fb573b1d136b07

    • SHA1

      f3ca4be74fcfc3b7eee2d6a000267ff543e9186a

    • SHA256

      c6452030b5c3054bc311e285ff98f147df2cd50898801cade4dc27974d54f357

    • SHA512

      82705fc4fbc8e9fa1152ea60afdd9cc6d0e9051b43b8b8f60874bba0d86c0a821c1d605c77ea48a3760a5b740f101ee7af00f74d8a10b3c4f6b9e5dab1a092e5

    • SSDEEP

      12288:mmqbNcTkr9j6uAuhwlZOipwR5EsGvFvcn5S5tW:WNcTMl6uv8ZhlRcnMjW

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • UAC bypass

    • Windows security bypass

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks