General

  • Target

    8d6eb147e9f5a3b0982844feda99dfb8572c1c9ae05e06248b012fc7e3f90d95N.exe

  • Size

    551KB

  • Sample

    241112-gg93tawfkg

  • MD5

    08954896c00964d3b4b7f4141c5eaa2a

  • SHA1

    4fd648890d357c14928bd8c8c5295702b870841b

  • SHA256

    278b095c0694af6600aea03963b86d9b19c2811651ca792508de36c7ec55a250

  • SHA512

    d1bd743329801f4871ef0c4fb29d9e939f727e48f28a55ac9d309384d866bfc15926570184ef26d7f3d23cc0221dc2d33e86e8d994e17890ad3a5ee713807924

  • SSDEEP

    12288:hhQbEeX/zYMIxKzS7no9YB6Hd5fZoyr+oqfk2Aqk4:hh0//PIV7ob/oyr+oq7

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

45.137.22.248:55615

Targets

    • Target

      8d6eb147e9f5a3b0982844feda99dfb8572c1c9ae05e06248b012fc7e3f90d95N.exe

    • Size

      551KB

    • MD5

      08954896c00964d3b4b7f4141c5eaa2a

    • SHA1

      4fd648890d357c14928bd8c8c5295702b870841b

    • SHA256

      278b095c0694af6600aea03963b86d9b19c2811651ca792508de36c7ec55a250

    • SHA512

      d1bd743329801f4871ef0c4fb29d9e939f727e48f28a55ac9d309384d866bfc15926570184ef26d7f3d23cc0221dc2d33e86e8d994e17890ad3a5ee713807924

    • SSDEEP

      12288:hhQbEeX/zYMIxKzS7no9YB6Hd5fZoyr+oqfk2Aqk4:hh0//PIV7ob/oyr+oq7

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks