General

  • Target

    5aa10b339b6e58a1c096d0423791826fbf026b18bf3d74d1237ddc40a53f8865

  • Size

    1.0MB

  • Sample

    241108-z6qpkssnel

  • MD5

    998f2e5bceb6a1fab9c470c043f82d8f

  • SHA1

    50808c742ee722a2fdcb8c4f0946ecf6b4a27712

  • SHA256

    5aa10b339b6e58a1c096d0423791826fbf026b18bf3d74d1237ddc40a53f8865

  • SHA512

    7186d645bb3b3206533bc0144f6d40fc5b38d3fdde5c0c58cf2ce9747021c522c92142bab7976493bfb67d11411cb0b9a592452685a82e6855e3b7adaa48151c

  • SSDEEP

    24576:R5REvpAFcBNJkdxisqaq6qaqs6JpzuppLWDQ8o/irQnywTC8cmdWjo2QCbofAzEL:RARAFcBNJkdxisqaq6qaqs6JpzuppLWC

Malware Config

Extracted

Family

redline

Botnet

perecrypt777

C2

80.92.206.82:45827

Targets

    • Target

      5aa10b339b6e58a1c096d0423791826fbf026b18bf3d74d1237ddc40a53f8865

    • Size

      1.0MB

    • MD5

      998f2e5bceb6a1fab9c470c043f82d8f

    • SHA1

      50808c742ee722a2fdcb8c4f0946ecf6b4a27712

    • SHA256

      5aa10b339b6e58a1c096d0423791826fbf026b18bf3d74d1237ddc40a53f8865

    • SHA512

      7186d645bb3b3206533bc0144f6d40fc5b38d3fdde5c0c58cf2ce9747021c522c92142bab7976493bfb67d11411cb0b9a592452685a82e6855e3b7adaa48151c

    • SSDEEP

      24576:R5REvpAFcBNJkdxisqaq6qaqs6JpzuppLWDQ8o/irQnywTC8cmdWjo2QCbofAzEL:RARAFcBNJkdxisqaq6qaqs6JpzuppLWC

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks