General

  • Target

    80ebb90ba41cb2a8cdb874bbfc673ada9dab505ea77220efffab52d4e3d5bd57

  • Size

    533KB

  • Sample

    241031-rd6lbszerl

  • MD5

    70f48f08139b4da58d508ae9bfc93209

  • SHA1

    a4e55f689ea128d8e64f78304661e5ab14ef893f

  • SHA256

    80ebb90ba41cb2a8cdb874bbfc673ada9dab505ea77220efffab52d4e3d5bd57

  • SHA512

    3b6528457e276d548e2ebebaaedfe110c1dc929bfd71d5b16b0e183809b71216c6761db509b68c854aa1153e8fe54b53e0adef4355eea4ecafce3b712acc355f

  • SSDEEP

    12288:a0uR8sqpJ0qZMmUzsQSAlS5sj3lkupV2Y:nuRep/vUzsQSAYsj6uuY

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

45.137.22.123:55615

Targets

    • Target

      Requirement.exe

    • Size

      634KB

    • MD5

      c3307b63528b8e570569d4b4b7368328

    • SHA1

      c7c461e05b8fdd696986788caa9140b38ead39e2

    • SHA256

      d4985c80c9f08a1f1a5ff5e958b10982042f3dc71fbb7ae993b27f299eb65328

    • SHA512

      f12eb9c9a646466c7c653598a099c63789840baa5c99e5a9f9b15d92781d75721b0809ca339638fdfa9d53595e5909be308043a7213c4353628b20c9bca359a3

    • SSDEEP

      12288:zSFG23vhidCI951hNjUZ+y/m0kQpkJJmzEujvLlR6z9TjcQ1AQw9:+Q235CB51rjUMy/mLQ8svR61jd1AT

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks