General

  • Target

    eac8d64bfbc083aa74bcf866c9dea7ac.exe

  • Size

    673KB

  • Sample

    250216-jq1lvazjhs

  • MD5

    eac8d64bfbc083aa74bcf866c9dea7ac

  • SHA1

    35b212e526376571b475664237a0d9b55810ad9e

  • SHA256

    5de17a5a924075eff342030dc58fab7443edb2a68c90749f674a5465552d1978

  • SHA512

    ac91135c1244ee8d4db77a04b9e2544eb1b3511935480881d3b91e751723d7f46308df579831d8651fc8d59938d3c85b8eb5cb421c2beb8cf95700e99c9384b4

  • SSDEEP

    12288:FcvVY6ao4/7xefpM4gwzzsCCB4sQqF8oDfArJPobxrJ+AS74kP:6vVJutehqUzzsQE8MfiotMA0

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

45.137.22.234:55615

Targets

    • Target

      eac8d64bfbc083aa74bcf866c9dea7ac.exe

    • Size

      673KB

    • MD5

      eac8d64bfbc083aa74bcf866c9dea7ac

    • SHA1

      35b212e526376571b475664237a0d9b55810ad9e

    • SHA256

      5de17a5a924075eff342030dc58fab7443edb2a68c90749f674a5465552d1978

    • SHA512

      ac91135c1244ee8d4db77a04b9e2544eb1b3511935480881d3b91e751723d7f46308df579831d8651fc8d59938d3c85b8eb5cb421c2beb8cf95700e99c9384b4

    • SSDEEP

      12288:FcvVY6ao4/7xefpM4gwzzsCCB4sQqF8oDfArJPobxrJ+AS74kP:6vVJutehqUzzsQE8MfiotMA0

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Downloads MZ/PE file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks