General

  • Target

    fe06a9c922af3f3424b89a2181517f2856fea026a234d5b55307cad89b606a53

  • Size

    501KB

  • Sample

    241114-kx8fpswfpd

  • MD5

    9e12d39d00a0efc3a3908a946b10c80b

  • SHA1

    1ff05ea92f6595505d9e55b028d931ab17ae415f

  • SHA256

    fe06a9c922af3f3424b89a2181517f2856fea026a234d5b55307cad89b606a53

  • SHA512

    3d79c91be9368566f6a8b0a153abf177de7372169950dc2a153f6476b4e41630afb5c9e4a61bd82370cc7c90d58bd0a0aea94b16120502c175305721d9ffbb98

  • SSDEEP

    12288:m8aIv61ixmuBIU1O8p1MH40vW7MtgT9yG1aQFbsG:Dy1seayHLO7VT9rdsG

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

45.137.22.252:55615

Targets

    • Target

      LIST PURCHASING SAMPLE.exe

    • Size

      612KB

    • MD5

      ecd159d26376dd7d518c1dceb594c2b6

    • SHA1

      60510c6bc575099d54d45cb488b55fe3e119598d

    • SHA256

      bf2fc65aa2d6ca7843ddfb3a059dbfe734aad5c9ca1daa1789bec5e3ff66b266

    • SHA512

      7b103b97a26bca47993212eb229920fff93caab667c682c9c3b93b52db4108df310d007ff9063ebc8036aeb748f989cf0d9a42de544d85a3a6da52e63b469161

    • SSDEEP

      12288:KRQIJ0r1ixmzU1OApFMH2CPw7oRttTI27rAdcpCJVMgnkR:wJo1ikOiHxI76nTr78dcpCJVTy

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks