General

  • Target

    cb1142bbbc794fdb6d25ad25711ef58f2e945b7ad49ff170cf1bd4b317e94e18.exe

  • Size

    95KB

  • Sample

    241204-ds3w4ayqet

  • MD5

    ad8cd5e3cfe29e30285f71f2b526b9e6

  • SHA1

    d8d73dfb2df56f6800aaf08604561c69c580c597

  • SHA256

    cb1142bbbc794fdb6d25ad25711ef58f2e945b7ad49ff170cf1bd4b317e94e18

  • SHA512

    9a5d65d56cc5bcfb8f7b873c1a160af5170ad48101ea15d574a86ce7486a299128016dbe8707ea8c9af7d9ff25f8379771650f7de89da7d9e051a7c0009cf088

  • SSDEEP

    1536:SqsuoqcslbG6jejoigIj43Ywzi0Zb78ivombfexv0ujXyyed2ytmulgS6pI:wDfUYj+zi0ZbYe1g0ujyzdGI

Malware Config

Extracted

Family

redline

Botnet

SSA

C2

45.61.159.66:55123

Targets

    • Target

      cb1142bbbc794fdb6d25ad25711ef58f2e945b7ad49ff170cf1bd4b317e94e18.exe

    • Size

      95KB

    • MD5

      ad8cd5e3cfe29e30285f71f2b526b9e6

    • SHA1

      d8d73dfb2df56f6800aaf08604561c69c580c597

    • SHA256

      cb1142bbbc794fdb6d25ad25711ef58f2e945b7ad49ff170cf1bd4b317e94e18

    • SHA512

      9a5d65d56cc5bcfb8f7b873c1a160af5170ad48101ea15d574a86ce7486a299128016dbe8707ea8c9af7d9ff25f8379771650f7de89da7d9e051a7c0009cf088

    • SSDEEP

      1536:SqsuoqcslbG6jejoigIj43Ywzi0Zb78ivombfexv0ujXyyed2ytmulgS6pI:wDfUYj+zi0ZbYe1g0ujyzdGI

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks