General

  • Target

    9632b0c0e242cef53b06a4e52dd154620184dded677e0a11be162278d8352b4e.exe

  • Size

    631KB

  • Sample

    250102-ctx7kayjet

  • MD5

    9f417a8434a3ea2932b0a23ebae7e7fa

  • SHA1

    fcf9b06b8bbd53e0b230c04a99bcc4c8f3bcec2f

  • SHA256

    9632b0c0e242cef53b06a4e52dd154620184dded677e0a11be162278d8352b4e

  • SHA512

    8f39db0eaa84fb61986e2181376d4d50a794d6f6c7afc700975e32d7ec503ff0975a7292e40b5b04d79c0db1ee6efc1cc3682522c8eb453c6d938fa10fe0416e

  • SSDEEP

    12288:N903IaOq+AuPSunbln1uDTfD3UZ/GiYZ9CCkCmYRZ2kF/o/3LqC:TaQR54D3wGiYZICkCPRZ2D/b

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

185.222.57.76:55615

Targets

    • Target

      9632b0c0e242cef53b06a4e52dd154620184dded677e0a11be162278d8352b4e.exe

    • Size

      631KB

    • MD5

      9f417a8434a3ea2932b0a23ebae7e7fa

    • SHA1

      fcf9b06b8bbd53e0b230c04a99bcc4c8f3bcec2f

    • SHA256

      9632b0c0e242cef53b06a4e52dd154620184dded677e0a11be162278d8352b4e

    • SHA512

      8f39db0eaa84fb61986e2181376d4d50a794d6f6c7afc700975e32d7ec503ff0975a7292e40b5b04d79c0db1ee6efc1cc3682522c8eb453c6d938fa10fe0416e

    • SSDEEP

      12288:N903IaOq+AuPSunbln1uDTfD3UZ/GiYZ9CCkCmYRZ2kF/o/3LqC:TaQR54D3wGiYZICkCPRZ2D/b

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks