General

  • Target

    9af174ba505768998cc4a21c8064e2805b7c1f196c66b7fd75ce6e01d5eb7b80

  • Size

    507KB

  • Sample

    241115-l13kasselp

  • MD5

    f27af94ad34a0195807b585652e55682

  • SHA1

    593b614cab5935dc570f760cd8adefc3539015ce

  • SHA256

    9af174ba505768998cc4a21c8064e2805b7c1f196c66b7fd75ce6e01d5eb7b80

  • SHA512

    61eaf371c3f26c08d4b487092a50d747afee0d22c92681191bc6e796c71150060827ca5040f99875edba89f6096ba1aaf6332ca319a35b0402779ce4f7fb8dd2

  • SSDEEP

    12288:LJ3HI6wCvDymkIr1xtn3oDg8KwumaWSXq3wN0WDDv33cGQb:LJHIQD9xtUfnNoqgiIDvMG2

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

ltgmred21.duckdns.org:25228

Targets

    • Target

      9af174ba505768998cc4a21c8064e2805b7c1f196c66b7fd75ce6e01d5eb7b80

    • Size

      507KB

    • MD5

      f27af94ad34a0195807b585652e55682

    • SHA1

      593b614cab5935dc570f760cd8adefc3539015ce

    • SHA256

      9af174ba505768998cc4a21c8064e2805b7c1f196c66b7fd75ce6e01d5eb7b80

    • SHA512

      61eaf371c3f26c08d4b487092a50d747afee0d22c92681191bc6e796c71150060827ca5040f99875edba89f6096ba1aaf6332ca319a35b0402779ce4f7fb8dd2

    • SSDEEP

      12288:LJ3HI6wCvDymkIr1xtn3oDg8KwumaWSXq3wN0WDDv33cGQb:LJHIQD9xtUfnNoqgiIDvMG2

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks