General

  • Target

    ed2f4c82dfda53a40f45db4f44a0c2bad6e34dc189ed0a8d9bb2143041829427

  • Size

    1.6MB

  • Sample

    241108-d23mpaxjhp

  • MD5

    08a7aa785537278ef2d85d28b15bc9ee

  • SHA1

    1bde9107405a394be8efca88e69c69e7462230ad

  • SHA256

    ed2f4c82dfda53a40f45db4f44a0c2bad6e34dc189ed0a8d9bb2143041829427

  • SHA512

    1d129d52a8cbcbd640845bae2986584d77471dbcc53cee7bd904bd05b2d248528b62867e3b1580cebaa308efc21df418cf4d8161afdfbb357411daf7a1e7179a

  • SSDEEP

    49152:h1kbGrJe/2GgiKN0ClzdcWMa4XPU7uSG/g1Pq4RQK:h1kbIe/2Gp2bfcZ1/gptRQ

Malware Config

Extracted

Family

redline

Botnet

@kulunchick

C2

95.181.152.5:46927

Attributes
  • auth_value

    cdf3919a262c0d6ba99116b375d7551c

Targets

    • Target

      ed2f4c82dfda53a40f45db4f44a0c2bad6e34dc189ed0a8d9bb2143041829427

    • Size

      1.6MB

    • MD5

      08a7aa785537278ef2d85d28b15bc9ee

    • SHA1

      1bde9107405a394be8efca88e69c69e7462230ad

    • SHA256

      ed2f4c82dfda53a40f45db4f44a0c2bad6e34dc189ed0a8d9bb2143041829427

    • SHA512

      1d129d52a8cbcbd640845bae2986584d77471dbcc53cee7bd904bd05b2d248528b62867e3b1580cebaa308efc21df418cf4d8161afdfbb357411daf7a1e7179a

    • SSDEEP

      49152:h1kbGrJe/2GgiKN0ClzdcWMa4XPU7uSG/g1Pq4RQK:h1kbIe/2Gp2bfcZ1/gptRQ

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks