General

  • Target

    24050e65286707adf974167b31a7443dbc40fe475d1cf2515fe1b318dfc0d4d7

  • Size

    1.4MB

  • Sample

    241112-ke728axnhx

  • MD5

    d49ddb40b2037ac73988f82b820f4cd1

  • SHA1

    a3b36cc36bdcf59c03794b3366a454ee0cb888d3

  • SHA256

    24050e65286707adf974167b31a7443dbc40fe475d1cf2515fe1b318dfc0d4d7

  • SHA512

    96deb0ffe41998f2866a71d9304877c1c20bd86b5cc5b48cb44398a516fb989473bbbf7084df2fe7f933d2ce594992966085df31276b324acc0f2c4950dc11a6

  • SSDEEP

    12288:H3XhFxpSPO4ZhtlsiVWKDXbn849nKxqt7Q2:HhFxcmEhtfXxdV

Malware Config

Extracted

Family

redline

Botnet

hyce

C2

193.70.111.186:13484

Targets

    • Target

      24050e65286707adf974167b31a7443dbc40fe475d1cf2515fe1b318dfc0d4d7

    • Size

      1.4MB

    • MD5

      d49ddb40b2037ac73988f82b820f4cd1

    • SHA1

      a3b36cc36bdcf59c03794b3366a454ee0cb888d3

    • SHA256

      24050e65286707adf974167b31a7443dbc40fe475d1cf2515fe1b318dfc0d4d7

    • SHA512

      96deb0ffe41998f2866a71d9304877c1c20bd86b5cc5b48cb44398a516fb989473bbbf7084df2fe7f933d2ce594992966085df31276b324acc0f2c4950dc11a6

    • SSDEEP

      12288:H3XhFxpSPO4ZhtlsiVWKDXbn849nKxqt7Q2:HhFxcmEhtfXxdV

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • UAC bypass

    • Windows security bypass

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks