General

  • Target

    c5d9fd491bc842c805fc0503f56cba88.exe

  • Size

    95KB

  • Sample

    250126-wlvw1syld1

  • MD5

    c5d9fd491bc842c805fc0503f56cba88

  • SHA1

    41b5de0eb29bf849149267b0a58d851eaaf86e36

  • SHA256

    dff98fa2ef4c751903606f1748844898a8254e799ae572725c64d9ebdba7a28c

  • SHA512

    b395f06d01e930975889a38927325270993d915da4ec346d0763a17601fb027b0126090a0e6c64ca234c53ee2e4ae85a8b82e1e7a9d14eea7945e8a10c0c5e31

  • SSDEEP

    1536:Bqs+FRcqWClbG6jejoigI743Ywzi0Zb78ivombfexv0ujXyyed2ItmulgS6pUl:veRclyY7+zi0ZbYe1g0ujyzdEU

Malware Config

Extracted

Family

redline

Botnet

hwidspoofer

C2

51.89.201.52:47142

Targets

    • Target

      c5d9fd491bc842c805fc0503f56cba88.exe

    • Size

      95KB

    • MD5

      c5d9fd491bc842c805fc0503f56cba88

    • SHA1

      41b5de0eb29bf849149267b0a58d851eaaf86e36

    • SHA256

      dff98fa2ef4c751903606f1748844898a8254e799ae572725c64d9ebdba7a28c

    • SHA512

      b395f06d01e930975889a38927325270993d915da4ec346d0763a17601fb027b0126090a0e6c64ca234c53ee2e4ae85a8b82e1e7a9d14eea7945e8a10c0c5e31

    • SSDEEP

      1536:Bqs+FRcqWClbG6jejoigI743Ywzi0Zb78ivombfexv0ujXyyed2ItmulgS6pUl:veRclyY7+zi0ZbYe1g0ujyzdEU

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks