General

  • Target

    6902bb3159915f7e95e3a03c06c00d195200d6fd3b4b987a324c0491fbfbddab

  • Size

    495KB

  • Sample

    241120-3tenbszrhk

  • MD5

    68d5b0152936d1eeecf03997d00cf576

  • SHA1

    0e5bc3bfc2e60e0578a5d95f801cbcb94dfbc873

  • SHA256

    6902bb3159915f7e95e3a03c06c00d195200d6fd3b4b987a324c0491fbfbddab

  • SHA512

    b7b64b8076af7397cca6cc46e396e38895a0c79ec1f206b3a0debbbb2c2e925b5e6f380bfc06dd393c1fbf0645e5a096207d1170db675936a8d64fbeca877e17

  • SSDEEP

    12288:SIkt/s0yy65Rw0PBtGfycYa8Lmo7PUFHCWDm4+jlfZD:uT65RLcYgskRxMl

Malware Config

Extracted

Family

redline

Botnet

hyce

C2

193.70.111.186:13484

Targets

    • Target

      6902bb3159915f7e95e3a03c06c00d195200d6fd3b4b987a324c0491fbfbddab

    • Size

      495KB

    • MD5

      68d5b0152936d1eeecf03997d00cf576

    • SHA1

      0e5bc3bfc2e60e0578a5d95f801cbcb94dfbc873

    • SHA256

      6902bb3159915f7e95e3a03c06c00d195200d6fd3b4b987a324c0491fbfbddab

    • SHA512

      b7b64b8076af7397cca6cc46e396e38895a0c79ec1f206b3a0debbbb2c2e925b5e6f380bfc06dd393c1fbf0645e5a096207d1170db675936a8d64fbeca877e17

    • SSDEEP

      12288:SIkt/s0yy65Rw0PBtGfycYa8Lmo7PUFHCWDm4+jlfZD:uT65RLcYgskRxMl

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks