General

  • Target

    d66aa5d9471168e262c16636a54de48022b6f75b622f8d1faf74c31087ef9964

  • Size

    7.2MB

  • Sample

    241110-tn393azfrr

  • MD5

    4ea9c69a064252d4938f1a13fa2f47f5

  • SHA1

    e6d38869c2fbf53ea8dc5e16d0493d652ea0ac25

  • SHA256

    d66aa5d9471168e262c16636a54de48022b6f75b622f8d1faf74c31087ef9964

  • SHA512

    162e02cca59e3c273140cc09ae39c8507d6aeecee6d508b48bec757ce3b3bf295d81b5c92ccc5b59bbadf2108aa3537c7fdf22a772f5964fbf6e094b2a8d8188

  • SSDEEP

    196608:hHdF2nfEUmkUl9pl9geWBXkQvqQ4xGn07xa:NdqfEDpXr938ZvhnQa

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

45.141.215.79:1639

Targets

    • Target

      3d5f4a6a061550225a30e76f8ff8ef379f158d14862c4b76a56a0844114de8e2

    • Size

      7.2MB

    • MD5

      7212e623e04d3427364e7f00a95bf932

    • SHA1

      5f8e0384cf7c209d804d9b10e3d2281a9c391fe7

    • SHA256

      3d5f4a6a061550225a30e76f8ff8ef379f158d14862c4b76a56a0844114de8e2

    • SHA512

      3a2ac1111eaaf17475235ee233819286848c45bb2d69a42803fde15f4ae609f63120ca3a9f945b80af1a7c565941e81513ecb90ef9ea1320240c81f77091f7df

    • SSDEEP

      196608:r+QDCeRpnhgR/BQ+/Svwj47kuTkGfxDlDlAs:s6MQ+/SvwOvY4

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Remote Service Session Hijacking: RDP Hijacking

      Adversaries may hijack a legitimate user's remote desktop session to move laterally within an environment.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks