General

  • Target

    430493ac9129bc7f949f5e1253e01e77942e497dd67472d8b8e38f634f4e20ea

  • Size

    693KB

  • Sample

    250110-2zh29ssjay

  • MD5

    555abb74b0b3fd5f7b855bff558338b4

  • SHA1

    76fd15d820c15b52de04765b88690951bb290a94

  • SHA256

    430493ac9129bc7f949f5e1253e01e77942e497dd67472d8b8e38f634f4e20ea

  • SHA512

    abc001a40938b328ee797aa8d42954ae088cdf27d37f2ef97d63eb9ddeea1eb2dc4ab2682be8df3bb341fb05597cbf19177b9e0c0365812047e0a5e5801a8b48

  • SSDEEP

    12288:vzq4E6mfJiLl90WcbQkpClSxoZZtYAILSFxmmtCGtvi2+s8eTODhB:REkDApClpZtYAILSFxmmEGIE8kOlB

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

185.222.57.77:55615

Targets

    • Target

      430493ac9129bc7f949f5e1253e01e77942e497dd67472d8b8e38f634f4e20ea

    • Size

      693KB

    • MD5

      555abb74b0b3fd5f7b855bff558338b4

    • SHA1

      76fd15d820c15b52de04765b88690951bb290a94

    • SHA256

      430493ac9129bc7f949f5e1253e01e77942e497dd67472d8b8e38f634f4e20ea

    • SHA512

      abc001a40938b328ee797aa8d42954ae088cdf27d37f2ef97d63eb9ddeea1eb2dc4ab2682be8df3bb341fb05597cbf19177b9e0c0365812047e0a5e5801a8b48

    • SSDEEP

      12288:vzq4E6mfJiLl90WcbQkpClSxoZZtYAILSFxmmtCGtvi2+s8eTODhB:REkDApClpZtYAILSFxmmEGIE8kOlB

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks