General

  • Target

    4dcb640873597f71cf9f0f6c3fbda8fee9cbbccbec182fc71131f8752d49f89b

  • Size

    1.0MB

  • Sample

    241220-y88shatpaq

  • MD5

    e6e32a5c1b621f034a269936e3a44c1e

  • SHA1

    ca923c8b646a5b0b7a99d82e2c8e23c1379870c7

  • SHA256

    4dcb640873597f71cf9f0f6c3fbda8fee9cbbccbec182fc71131f8752d49f89b

  • SHA512

    225ebd4d9d1c4c21ef10b4556bc77660e902942ef8b5a71a796d4961b5e03746af6bfd5e7f6e46bc744ac1e2843c1999bfd6572719546e97dd8c57913fad52e0

  • SSDEEP

    24576:tqDEvCTbMWu7rQYlBQcBiT6rprG8aAbdjgk:tTvC/MTQYxsWR7aAbdjg

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

185.222.58.84:55615

Targets

    • Target

      4dcb640873597f71cf9f0f6c3fbda8fee9cbbccbec182fc71131f8752d49f89b

    • Size

      1.0MB

    • MD5

      e6e32a5c1b621f034a269936e3a44c1e

    • SHA1

      ca923c8b646a5b0b7a99d82e2c8e23c1379870c7

    • SHA256

      4dcb640873597f71cf9f0f6c3fbda8fee9cbbccbec182fc71131f8752d49f89b

    • SHA512

      225ebd4d9d1c4c21ef10b4556bc77660e902942ef8b5a71a796d4961b5e03746af6bfd5e7f6e46bc744ac1e2843c1999bfd6572719546e97dd8c57913fad52e0

    • SSDEEP

      24576:tqDEvCTbMWu7rQYlBQcBiT6rprG8aAbdjgk:tTvC/MTQYxsWR7aAbdjg

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks