General

  • Target

    24b1454141362b9675b17e9d779c5c93.bin

  • Size

    43KB

  • Sample

    250108-bgwyasxlas

  • MD5

    c0d477ba33ebb2d04b74f04b35b1fe08

  • SHA1

    9b8def10b8d1ea9cf4ec6b51cc364827bebef114

  • SHA256

    31bded119969fb6cb9614819db05d756bbf53c6c9afa5d5ca6d4f6ec1214321e

  • SHA512

    c9deb03059b6134b74843a583309981fed3fcf74fcff9ae579e765a1b93346a6adc083543e814e5492d95b1b676d9b02e691454d25ef1154c46acaaccfe9cd50

  • SSDEEP

    768:uhdYgPi3SvjSjBwP8fUfKsUcrfnLMOW2SqwsX2g0V9WCzfztPfd91p0akoXlDkE6:uhdYJva82UczngOWvqwC8jzfztPVJPfW

Malware Config

Extracted

Family

redline

Botnet

@Pr0xyBro

C2

77.90.22.45:15352

Targets

    • Target

      a94af8234c234fb5e65dedcfb33823abfbbefd0f451bbbddd96b6fc455e4cfa1.exe

    • Size

      95KB

    • MD5

      24b1454141362b9675b17e9d779c5c93

    • SHA1

      485b0ecf657a25dc28913e29bcfb91f47055af81

    • SHA256

      a94af8234c234fb5e65dedcfb33823abfbbefd0f451bbbddd96b6fc455e4cfa1

    • SHA512

      bc63bd7fa3b2183982a34411a14770235fb1eb7659a303fe508a8fe20b7642d9050f7f6323db229d16756d70e2d12dd9cd1fcfdfa6e76ff954766f14e43ef756

    • SSDEEP

      1536:5qskOqJGlbG6jejoigIj43Ywzi0Zb78ivombfexv0ujXyyed2xteulgS6p8l:XPuOYj+zi0ZbYe1g0ujyzdV8

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks