General

  • Target

    b85140d8f018b50554acd3fedf3750d878aca1dbf58b3157b30209e361764736

  • Size

    1.2MB

  • Sample

    241108-m94pdstmhj

  • MD5

    65b2f13ba5e5cdad5e053de3791d2eb4

  • SHA1

    07059e245b7068f205b61da49b3caf514dc25761

  • SHA256

    b85140d8f018b50554acd3fedf3750d878aca1dbf58b3157b30209e361764736

  • SHA512

    0cd9aa68e7f0c8c7447a8bc620c928f59a4b32e80c6b453cfde55c20242539d89f9d5c8baafcd56b776509b89cb2713c29f76e0fd4563c91c3ba9c8fd4b2c24a

  • SSDEEP

    12288:zXbZRm+GBCij769yptQkM2V4LNS8bMNKV0t76ih/:jbZRmjdVCj2MSbNKEx

Malware Config

Extracted

Family

redline

Botnet

client

C2

104.243.33.119:300

Targets

    • Target

      HEEX-SO010483.exe

    • Size

      594KB

    • MD5

      39c7a9eb89bfd37f75b680390e556709

    • SHA1

      a05349b8760937693077cff5887444e1b20b6b19

    • SHA256

      c96a4929bbf67a9c4dca1da11d932a3ff8a4e0702933aa30c3835559f6771d0c

    • SHA512

      11394ab6dd63e2ecf68c407fb93a820aa926c7ca76812f68a8d0a3984297e41f91408192f86e67f3990005e251c13d67fff9046579ed0b6a30d28f0dc9109f85

    • SSDEEP

      12288:gXbZRm+GBCij769yptQkM2V4LNS8bMNKV0t76ih/:cbZRmjdVCj2MSbNKEx

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks