General

  • Target

    0e2bc3bbb537be685839790e355fe7f5.exe

  • Size

    538KB

  • Sample

    241031-y7rslatcrm

  • MD5

    0e2bc3bbb537be685839790e355fe7f5

  • SHA1

    ea521b538d2edda4663aa9a287c3a8eb04dfc943

  • SHA256

    3a52334a83d46e6cb089b679a46ba9c139f784899f6f93866ebb92d74d3f7419

  • SHA512

    d4c49c4a2ba2be93acc47a5ec1a34538b41e341452b1d98372f41079a739d0e8ebb6d2fd3cfce273bbc7a638530ec5889957a37425357b8cbc5cd7aa2f9d7dcf

  • SSDEEP

    12288:hMfzu3uphyrk6J6/FmO9pmJI08L4lspyk1MlmV8kR:hsZyrkA6/MO9pmJCdpykiC

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

185.222.58.240:55615

Targets

    • Target

      0e2bc3bbb537be685839790e355fe7f5.exe

    • Size

      538KB

    • MD5

      0e2bc3bbb537be685839790e355fe7f5

    • SHA1

      ea521b538d2edda4663aa9a287c3a8eb04dfc943

    • SHA256

      3a52334a83d46e6cb089b679a46ba9c139f784899f6f93866ebb92d74d3f7419

    • SHA512

      d4c49c4a2ba2be93acc47a5ec1a34538b41e341452b1d98372f41079a739d0e8ebb6d2fd3cfce273bbc7a638530ec5889957a37425357b8cbc5cd7aa2f9d7dcf

    • SSDEEP

      12288:hMfzu3uphyrk6J6/FmO9pmJI08L4lspyk1MlmV8kR:hsZyrkA6/MO9pmJCdpykiC

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks