General

  • Target

    d9184ae3da1eafd4621efd0b4c79c0fd01a25b8dfaf876aa57aa100f5f5a1bce

  • Size

    1.0MB

  • Sample

    241111-f82ebatfkj

  • MD5

    742700f0677d095a5d38f64abf5042d7

  • SHA1

    bc3e9168d9f2d4c2dba2fdc00b725ac9199d82c3

  • SHA256

    d9184ae3da1eafd4621efd0b4c79c0fd01a25b8dfaf876aa57aa100f5f5a1bce

  • SHA512

    b45e67c130e2209531efd6fd7d28d9e9f4e79209cc9ebbcecb13e310d6c12c720321062d497b9a3721d93557200ac1a64bea949a78bd2259f9cef24a5329e9c4

  • SSDEEP

    24576:u9btxEObap2SDlQYPFzk6FnYp7HKmfe+ky24B:uNNbA2YQYPFzk6RKHre+kV4B

Malware Config

Extracted

Family

redline

Botnet

3333444555666

C2

80.92.206.82:45827

Targets

    • Target

      d9184ae3da1eafd4621efd0b4c79c0fd01a25b8dfaf876aa57aa100f5f5a1bce

    • Size

      1.0MB

    • MD5

      742700f0677d095a5d38f64abf5042d7

    • SHA1

      bc3e9168d9f2d4c2dba2fdc00b725ac9199d82c3

    • SHA256

      d9184ae3da1eafd4621efd0b4c79c0fd01a25b8dfaf876aa57aa100f5f5a1bce

    • SHA512

      b45e67c130e2209531efd6fd7d28d9e9f4e79209cc9ebbcecb13e310d6c12c720321062d497b9a3721d93557200ac1a64bea949a78bd2259f9cef24a5329e9c4

    • SSDEEP

      24576:u9btxEObap2SDlQYPFzk6FnYp7HKmfe+ky24B:uNNbA2YQYPFzk6RKHre+kV4B

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks