General

  • Target

    3726ee297e39481c17efbe020ef5cfcc.exe

  • Size

    687KB

  • Sample

    241203-pl6j7a1jbq

  • MD5

    3726ee297e39481c17efbe020ef5cfcc

  • SHA1

    905988b5b2601a21688bc002e79fad8855969d25

  • SHA256

    7010f01eb61a3e6171cff3f45dffda217cab75fcd8e6055d37bb9976d1e8294f

  • SHA512

    dcb386b1c12f993e62376949cbe6437ffbc3c44c3c572c6c1da38bad00778caa22946538e685b2e2eff49cc87a139ae385db88ca39a963d84c58db2031880cff

  • SSDEEP

    12288:d2sv+SGjpA3yKUUo6aYqcpeLWMynFE9gjuozkBfe3bnFtA6E2Y09dCvzCnYb+iX:d2xjCqyQCFPjuSv3hC6E3090LCnYn

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

185.222.58.229:55615

Targets

    • Target

      3726ee297e39481c17efbe020ef5cfcc.exe

    • Size

      687KB

    • MD5

      3726ee297e39481c17efbe020ef5cfcc

    • SHA1

      905988b5b2601a21688bc002e79fad8855969d25

    • SHA256

      7010f01eb61a3e6171cff3f45dffda217cab75fcd8e6055d37bb9976d1e8294f

    • SHA512

      dcb386b1c12f993e62376949cbe6437ffbc3c44c3c572c6c1da38bad00778caa22946538e685b2e2eff49cc87a139ae385db88ca39a963d84c58db2031880cff

    • SSDEEP

      12288:d2sv+SGjpA3yKUUo6aYqcpeLWMynFE9gjuozkBfe3bnFtA6E2Y09dCvzCnYb+iX:d2xjCqyQCFPjuSv3hC6E3090LCnYn

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks