General

  • Target

    947F58042679156DED0A2ECD613AAF41.exe

  • Size

    666KB

  • Sample

    250112-kv7rdsvqgz

  • MD5

    947f58042679156ded0a2ecd613aaf41

  • SHA1

    91427835794cc9a879fb74d87b031041fdc82de7

  • SHA256

    f6c421af1d77e22e3ba248c90178894cd9c95c01397f1798c7d02a4442903e49

  • SHA512

    3b3063749aff1908e8109a8a8cc4764e4625c35ec967734cc436894c897b5366c4cf8149860095b3770f8bff14dc9ccd7c2d97a8118cd6db8b0891104001d348

  • SSDEEP

    12288:H8q4E6mfJiLl90WcbQkpClSMdy9AWSZZM119BKmA8K1NSI/VRWXI:IEkDApCl7U9WZZQBhA8Y9cX

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

185.222.58.254:55615

Targets

    • Target

      947F58042679156DED0A2ECD613AAF41.exe

    • Size

      666KB

    • MD5

      947f58042679156ded0a2ecd613aaf41

    • SHA1

      91427835794cc9a879fb74d87b031041fdc82de7

    • SHA256

      f6c421af1d77e22e3ba248c90178894cd9c95c01397f1798c7d02a4442903e49

    • SHA512

      3b3063749aff1908e8109a8a8cc4764e4625c35ec967734cc436894c897b5366c4cf8149860095b3770f8bff14dc9ccd7c2d97a8118cd6db8b0891104001d348

    • SSDEEP

      12288:H8q4E6mfJiLl90WcbQkpClSMdy9AWSZZM119BKmA8K1NSI/VRWXI:IEkDApCl7U9WZZQBhA8Y9cX

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks