General

  • Target

    ebe439a30d407f0538e51cba438bc7e601cd5e864d9546bbcabd8ada10662d6b

  • Size

    554KB

  • Sample

    241227-ggyd1ssmhq

  • MD5

    0866aeb52183e280be3822f086da10b6

  • SHA1

    3abb8b3c7566dbb4aaac7eba8a5e79e9215294bc

  • SHA256

    ebe439a30d407f0538e51cba438bc7e601cd5e864d9546bbcabd8ada10662d6b

  • SHA512

    b3e6cafe8028943afaf7ad924ccd54122872077bebb323f674c7403e6e6e2019bf0e566c3a19d150655023e884b47f0b9a129fa81f80d96a7c6fb900ecf6e05f

  • SSDEEP

    12288:BVXqiT2PxG9kG/ODTVovIvQkMezNDl5IhaRwqTk89qPj/7c:DkU9F/BOJDjIURF8PXc

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

185.222.58.82:55615

Targets

    • Target

      SAMPLES & QUANTITY.exe

    • Size

      628KB

    • MD5

      32dadf5259c17644e7605dd1382409d9

    • SHA1

      65f98be9a8adea90f69dcd115fb82089b879ee5f

    • SHA256

      78f637413574de4d2fae22693696d4f9e05bc3622c304ece3baa8788cff651c6

    • SHA512

      755b9144d5db27da7d3954793b5992de35d495e665c43553782328693eb7310f0c34e1827e45796917db74c0d404ae87bc687a7eadfa5835ef8daf55f947a2bc

    • SSDEEP

      12288:azVxGIaOq+A3RNoVMXQWPYUDdxFAvKRwqexk6k7hCPFO:aZxhaO+PYKASRWBktC

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks