General

  • Target

    128985f1be0a64f43674e4e287eda262713c5bc3288582d97d1463b15d2d35f7.exe

  • Size

    1.6MB

  • Sample

    250118-dkrh4a1kdz

  • MD5

    7c86d24bf10f9a6970b3c7c86e455423

  • SHA1

    390d4d70d950a0e0f1a2744296e841bf70024b8d

  • SHA256

    128985f1be0a64f43674e4e287eda262713c5bc3288582d97d1463b15d2d35f7

  • SHA512

    2ed282b054d77a4a38f57a1e95b3ed87d651a47c4ee4dac0185901cf9dfb024710dfd8fb48d2dfba19ef9462715866ac5bcf84c22712889d9099b671efc5cf7d

  • SSDEEP

    49152:DAd13wMCDhEwBfmK4ie7SiAeOh2NmV8Xo1:DAd131eENDiPhIho1

Malware Config

Extracted

Family

redline

Botnet

20_1

C2

gimpimageeditor.com:80

Targets

    • Target

      128985f1be0a64f43674e4e287eda262713c5bc3288582d97d1463b15d2d35f7.exe

    • Size

      1.6MB

    • MD5

      7c86d24bf10f9a6970b3c7c86e455423

    • SHA1

      390d4d70d950a0e0f1a2744296e841bf70024b8d

    • SHA256

      128985f1be0a64f43674e4e287eda262713c5bc3288582d97d1463b15d2d35f7

    • SHA512

      2ed282b054d77a4a38f57a1e95b3ed87d651a47c4ee4dac0185901cf9dfb024710dfd8fb48d2dfba19ef9462715866ac5bcf84c22712889d9099b671efc5cf7d

    • SSDEEP

      49152:DAd13wMCDhEwBfmK4ie7SiAeOh2NmV8Xo1:DAd131eENDiPhIho1

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks