General

  • Target

    32c3b9ac52bb171a1ef3621ac646aefb43cc9619125bf504bf249c2f1167e751

  • Size

    608KB

  • Sample

    250213-d5d4hasmdj

  • MD5

    83900338ff3c883cf29f709612011439

  • SHA1

    ee1b929bad5add7a53eb99cb44e4207d44f2b432

  • SHA256

    32c3b9ac52bb171a1ef3621ac646aefb43cc9619125bf504bf249c2f1167e751

  • SHA512

    0dea833633d32f870ba2041fbd05798dce76cdbdccd9fc59119c4c2491bdaf0aa584588c7140179523a6589a8329e5a197aced124436adba07f4be943a76a8ec

  • SSDEEP

    12288:9yvRY1piOhgXj2oC1Qq8OwzdKB4sQAr8oDnsrJPybpJJiVUXTqb:QvRShhgzvCZ8OUrsQa8MnOyHcVUjqb

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

45.137.22.234:55615

Targets

    • Target

      SAMPLE & DRAWING.exe

    • Size

      673KB

    • MD5

      eac8d64bfbc083aa74bcf866c9dea7ac

    • SHA1

      35b212e526376571b475664237a0d9b55810ad9e

    • SHA256

      5de17a5a924075eff342030dc58fab7443edb2a68c90749f674a5465552d1978

    • SHA512

      ac91135c1244ee8d4db77a04b9e2544eb1b3511935480881d3b91e751723d7f46308df579831d8651fc8d59938d3c85b8eb5cb421c2beb8cf95700e99c9384b4

    • SSDEEP

      12288:FcvVY6ao4/7xefpM4gwzzsCCB4sQqF8oDfArJPobxrJ+AS74kP:6vVJutehqUzzsQE8MfiotMA0

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Downloads MZ/PE file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks