General

  • Target

    build.exe

  • Size

    95KB

  • Sample

    250106-nv7ceavra1

  • MD5

    24b1454141362b9675b17e9d779c5c93

  • SHA1

    485b0ecf657a25dc28913e29bcfb91f47055af81

  • SHA256

    a94af8234c234fb5e65dedcfb33823abfbbefd0f451bbbddd96b6fc455e4cfa1

  • SHA512

    bc63bd7fa3b2183982a34411a14770235fb1eb7659a303fe508a8fe20b7642d9050f7f6323db229d16756d70e2d12dd9cd1fcfdfa6e76ff954766f14e43ef756

  • SSDEEP

    1536:5qskOqJGlbG6jejoigIj43Ywzi0Zb78ivombfexv0ujXyyed2xteulgS6p8l:XPuOYj+zi0ZbYe1g0ujyzdV8

Malware Config

Extracted

Family

redline

Botnet

@Pr0xyBro

C2

77.90.22.45:15352

Targets

    • Target

      build.exe

    • Size

      95KB

    • MD5

      24b1454141362b9675b17e9d779c5c93

    • SHA1

      485b0ecf657a25dc28913e29bcfb91f47055af81

    • SHA256

      a94af8234c234fb5e65dedcfb33823abfbbefd0f451bbbddd96b6fc455e4cfa1

    • SHA512

      bc63bd7fa3b2183982a34411a14770235fb1eb7659a303fe508a8fe20b7642d9050f7f6323db229d16756d70e2d12dd9cd1fcfdfa6e76ff954766f14e43ef756

    • SSDEEP

      1536:5qskOqJGlbG6jejoigIj43Ywzi0Zb78ivombfexv0ujXyyed2xteulgS6p8l:XPuOYj+zi0ZbYe1g0ujyzdV8

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks