General

  • Target

    65b74f187c506cf5c1fafde03e60e7df.exe

  • Size

    95KB

  • Sample

    250126-h8fhysxkaj

  • MD5

    65b74f187c506cf5c1fafde03e60e7df

  • SHA1

    cc637bd3264aa57c53eb2fc7de0f891ce5eb0648

  • SHA256

    e08c5b92f6cce3513d9a58de856f9bceca56ad1fb4eea32e182f837b566c6d33

  • SHA512

    787f52f19847bed7da266cd16948d4935ed4089eb0df4817054a67324e3855514687e6e58f61b321f1d2975fe1e747bc11ff07a78edb6bfedc2cbe3fb2d090ff

  • SSDEEP

    1536:Nqs+iqeHlbG6jejoigIH43Ywzi0Zb78ivombfexv0ujXyyed2pteulgS6pIl:7VpVYH+zi0ZbYe1g0ujyzd9I

Malware Config

Extracted

Family

redline

Botnet

godseye3-01-25

C2

23.27.201.57:62529

Targets

    • Target

      65b74f187c506cf5c1fafde03e60e7df.exe

    • Size

      95KB

    • MD5

      65b74f187c506cf5c1fafde03e60e7df

    • SHA1

      cc637bd3264aa57c53eb2fc7de0f891ce5eb0648

    • SHA256

      e08c5b92f6cce3513d9a58de856f9bceca56ad1fb4eea32e182f837b566c6d33

    • SHA512

      787f52f19847bed7da266cd16948d4935ed4089eb0df4817054a67324e3855514687e6e58f61b321f1d2975fe1e747bc11ff07a78edb6bfedc2cbe3fb2d090ff

    • SSDEEP

      1536:Nqs+iqeHlbG6jejoigIH43Ywzi0Zb78ivombfexv0ujXyyed2pteulgS6pIl:7VpVYH+zi0ZbYe1g0ujyzd9I

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks