General

  • Target

    88952-2007-0x0000000000C50000-0x00000000010C8000-memory.dmp

  • Size

    2.6MB

  • Sample

    250219-c7r8gavnek

  • MD5

    f64a8cf8be324bf637a1056df0c6a90f

  • SHA1

    fb77edc2d8b0771ee201d7068651c50c7e8ff11e

  • SHA256

    b931b29b50423a8b371ce61b28d34ee010d2ef26c0dad533fd04c84dfadc8dad

  • SHA512

    8b7d0b21da9a74be9c8bc3d2ace502f18d234c4b8311fe483563e042dfd14abb585bf971e58c6b108a971aa4a262e9ae3646dfa51edc21892e6cbbb95ea537aa

  • SSDEEP

    24576:UpLroeRrsocze8duf2Q+0u+pIuwZaM8/WhUpx2bsfCAo9xPleHY3U90PPBtk89CX:iRrBR6Yu++eY3U9WBhnHNvW7

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

103.84.89.222:33791

Targets

    • Target

      88952-2007-0x0000000000C50000-0x00000000010C8000-memory.dmp

    • Size

      2.6MB

    • MD5

      f64a8cf8be324bf637a1056df0c6a90f

    • SHA1

      fb77edc2d8b0771ee201d7068651c50c7e8ff11e

    • SHA256

      b931b29b50423a8b371ce61b28d34ee010d2ef26c0dad533fd04c84dfadc8dad

    • SHA512

      8b7d0b21da9a74be9c8bc3d2ace502f18d234c4b8311fe483563e042dfd14abb585bf971e58c6b108a971aa4a262e9ae3646dfa51edc21892e6cbbb95ea537aa

    • SSDEEP

      24576:UpLroeRrsocze8duf2Q+0u+pIuwZaM8/WhUpx2bsfCAo9xPleHY3U90PPBtk89CX:iRrBR6Yu++eY3U9WBhnHNvW7

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks