General

  • Target

    3052-1-0x0000000001370000-0x00000000017C2000-memory.dmp

  • Size

    4.3MB

  • Sample

    250205-mbb7gstlhp

  • MD5

    5c883c43945c135676b6742c3a9532df

  • SHA1

    e27ea722bc69b43b125d6a2eb23d9a37fe6b0580

  • SHA256

    ee31c4cba6b4232ceafa3daa5c1e73249efdba57e4cb63f012b314b49c15d240

  • SHA512

    c365c9aadfc714e0d46dea88a17281d0f22d3bc5deb1d409e8a314b403e6ba36c1f0610c746a1380ed70e26ae17337dc7f2db1c51f9981e25254b970fddaf75b

  • SSDEEP

    98304:JxylZpEqZcrEAz3Cf+0rFVXxSyFzN0OpuLV+fN9c:SZCrdzyfjX4a50V+V9c

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

103.84.89.222:33791

Targets

    • Target

      3052-1-0x0000000001370000-0x00000000017C2000-memory.dmp

    • Size

      4.3MB

    • MD5

      5c883c43945c135676b6742c3a9532df

    • SHA1

      e27ea722bc69b43b125d6a2eb23d9a37fe6b0580

    • SHA256

      ee31c4cba6b4232ceafa3daa5c1e73249efdba57e4cb63f012b314b49c15d240

    • SHA512

      c365c9aadfc714e0d46dea88a17281d0f22d3bc5deb1d409e8a314b403e6ba36c1f0610c746a1380ed70e26ae17337dc7f2db1c51f9981e25254b970fddaf75b

    • SSDEEP

      98304:JxylZpEqZcrEAz3Cf+0rFVXxSyFzN0OpuLV+fN9c:SZCrdzyfjX4a50V+V9c

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks