General

  • Target

    4ae69707fe39339915373a1ec3adaea49a73a9656c99fe27ecda591049be9d53.exe

  • Size

    607KB

  • Sample

    250111-dm2f3stmar

  • MD5

    9451be6a28dc660c832d444f7cc53a58

  • SHA1

    077f6a146080489988113104f6b9985c9e806290

  • SHA256

    4ae69707fe39339915373a1ec3adaea49a73a9656c99fe27ecda591049be9d53

  • SHA512

    0ed05ba676db20cea8e7ea5aae10d215cdb7d22ce82dc7e8c7b433833b67896bc816fa4512d08b427f566d4e012384d44e9f2106e4e59287699ef200c8770c51

  • SSDEEP

    12288:4nl1cUoV+I4MVKWE5SXa+1nhCF3pGtBM63blYrw2n5nh8zHB:4nluRgJSt9tD3blYrw8/0HB

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

185.222.57.94:55615

Targets

    • Target

      4ae69707fe39339915373a1ec3adaea49a73a9656c99fe27ecda591049be9d53.exe

    • Size

      607KB

    • MD5

      9451be6a28dc660c832d444f7cc53a58

    • SHA1

      077f6a146080489988113104f6b9985c9e806290

    • SHA256

      4ae69707fe39339915373a1ec3adaea49a73a9656c99fe27ecda591049be9d53

    • SHA512

      0ed05ba676db20cea8e7ea5aae10d215cdb7d22ce82dc7e8c7b433833b67896bc816fa4512d08b427f566d4e012384d44e9f2106e4e59287699ef200c8770c51

    • SSDEEP

      12288:4nl1cUoV+I4MVKWE5SXa+1nhCF3pGtBM63blYrw2n5nh8zHB:4nluRgJSt9tD3blYrw8/0HB

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks