General

  • Target

    b3af9675cef7e3a371e7a3d98d141b2bc6cbbc5da2df140dc09cf918ee3c62da.exe

  • Size

    807KB

  • Sample

    241125-ddwjgazqgr

  • MD5

    4376650c9845c351ba30d405b17d3502

  • SHA1

    5c2d70381a10d51d776365eea6f513a85597b3f3

  • SHA256

    b3af9675cef7e3a371e7a3d98d141b2bc6cbbc5da2df140dc09cf918ee3c62da

  • SHA512

    6b5c65c0cbd55ba99cf1b176f9073c3009bb8588a22c6ae9e8aa9ab1edd4514e2939e2882c7d2cc06112a47ecd384974c6fca6c3ffd94bc5e355790349b5f19a

  • SSDEEP

    12288:LcsCELA+12Hd5lpvS36pDfi/xN3xKwcOrrNCtzV2VzxWWopuRJqbs4COMTp8bDx5:89Orr0zVKzxW1AJq0OPqpAEmnc

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

185.222.58.241:55615

Targets

    • Target

      b3af9675cef7e3a371e7a3d98d141b2bc6cbbc5da2df140dc09cf918ee3c62da.exe

    • Size

      807KB

    • MD5

      4376650c9845c351ba30d405b17d3502

    • SHA1

      5c2d70381a10d51d776365eea6f513a85597b3f3

    • SHA256

      b3af9675cef7e3a371e7a3d98d141b2bc6cbbc5da2df140dc09cf918ee3c62da

    • SHA512

      6b5c65c0cbd55ba99cf1b176f9073c3009bb8588a22c6ae9e8aa9ab1edd4514e2939e2882c7d2cc06112a47ecd384974c6fca6c3ffd94bc5e355790349b5f19a

    • SSDEEP

      12288:LcsCELA+12Hd5lpvS36pDfi/xN3xKwcOrrNCtzV2VzxWWopuRJqbs4COMTp8bDx5:89Orr0zVKzxW1AJq0OPqpAEmnc

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks