General

  • Target

    7095ea6370e2e8185b67f10ab1f4474c54c9e32ab720f9812c357f06c58b1582

  • Size

    734KB

  • Sample

    241112-fz9pbsvmcv

  • MD5

    1710e3e9ff7bd58e4c2000f64f947bd9

  • SHA1

    47133f8ea93bbb9014e77b7bf56566d9b898fed9

  • SHA256

    7095ea6370e2e8185b67f10ab1f4474c54c9e32ab720f9812c357f06c58b1582

  • SHA512

    cb45491ef447d5ed3f4d225dd5273222794d81dc152d3e0fb929cd3f4fb4e86418ac971704a63be3ab5cf134d9784b99825c8a26af25d436a632bcc6352dfcd1

  • SSDEEP

    12288:NIukfvsunsiI3Tf8g53hoz7u91mJqMl12+ZGWfYt+rqi1FziXYsPykDgBJA95n2W:NRknDno3Tk+h5m8MhZG54zePykGA952W

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

45.137.22.252:55615

Targets

    • Target

      MAIN PRODUCT LIST.exe

    • Size

      862KB

    • MD5

      811c545aa729514b90bb9fd23c59d3b3

    • SHA1

      7336cc7e0c07510578b2ae17ec1ff9d13d076951

    • SHA256

      f6f4b5609a801705b82bf007e6bb17b79113c0c53641aea3be0a868bf7546fab

    • SHA512

      16876ec3527da4220cbd37acd8e8799cf879b32ab5756eb2f894fe969bc41483fb7652a272e4776306763b31efdf6e94f9709e1c23575c7bf80bcb7333af6d9a

    • SSDEEP

      12288:CWWCcL0nsDi0Q00QEhqIlq+1j1XCGziBYqPWaDgT2YnhQO86GwkR:bWonNmO5Cw0PWajZO86E

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks