General

  • Target

    QUOTATION#09678.exe

  • Size

    2.7MB

  • Sample

    241101-je8s3szncp

  • MD5

    4e5909728a72eb29f5cf1fe01867c982

  • SHA1

    8d0638e33dd590d0ca6ad6918d7e3e25762613d4

  • SHA256

    e87c540a4074fccadf3a56a1a0ef71bc952382d21c366c2a969e8d52bb25d609

  • SHA512

    51f58be1e03e72a50d37599d3ffa91bcdb604e09e50e76557a38933077c7479e26b3a399b830ef7d4b4d4ef0588c624746a901199473414fc2156ddc72a5ddf1

  • SSDEEP

    12288:xnjVswcPUvDQVeGqHmPkaoyyMO/xA3lhSWN54ae:xjWwcPuDoAaoXaqWN54p

Malware Config

Extracted

Family

redline

Botnet

nwa

C2

94.141.120.6:55123

Targets

    • Target

      QUOTATION#09678.exe

    • Size

      2.7MB

    • MD5

      4e5909728a72eb29f5cf1fe01867c982

    • SHA1

      8d0638e33dd590d0ca6ad6918d7e3e25762613d4

    • SHA256

      e87c540a4074fccadf3a56a1a0ef71bc952382d21c366c2a969e8d52bb25d609

    • SHA512

      51f58be1e03e72a50d37599d3ffa91bcdb604e09e50e76557a38933077c7479e26b3a399b830ef7d4b4d4ef0588c624746a901199473414fc2156ddc72a5ddf1

    • SSDEEP

      12288:xnjVswcPUvDQVeGqHmPkaoyyMO/xA3lhSWN54ae:xjWwcPuDoAaoXaqWN54p

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • UAC bypass

    • Windows security bypass

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks