General

  • Target

    3368-1493-0x0000000000AB0000-0x0000000000F28000-memory.dmp

  • Size

    4.5MB

  • Sample

    250219-rj1l9sslcx

  • MD5

    5f154daeb258032876c628f5a9674018

  • SHA1

    27cb8be953eab5a64360aee227acc6474a99c2c6

  • SHA256

    5b1a63ce997d2de352d2ee040b3a0b457a0cd7ce829421f1a0d156d6def29bde

  • SHA512

    cb5acbc35311a6b86c6fd708d38d18d8ccf6348a3c944bd89b9dfb8a9cfc16e343d9737d397971fb2e7ce84cff39e35027e8e91fc29d38fc5bea972725df28a5

  • SSDEEP

    49152:fRrBR6Yu++p+5rPlBzzI+vq26VUZJPqyhWzXRU6l3rIDUmGhgscIa:fRNR6Yu+RrPTs+vq2DFFIlcDUBa/I

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

103.84.89.222:33791

Targets

    • Target

      3368-1493-0x0000000000AB0000-0x0000000000F28000-memory.dmp

    • Size

      4.5MB

    • MD5

      5f154daeb258032876c628f5a9674018

    • SHA1

      27cb8be953eab5a64360aee227acc6474a99c2c6

    • SHA256

      5b1a63ce997d2de352d2ee040b3a0b457a0cd7ce829421f1a0d156d6def29bde

    • SHA512

      cb5acbc35311a6b86c6fd708d38d18d8ccf6348a3c944bd89b9dfb8a9cfc16e343d9737d397971fb2e7ce84cff39e35027e8e91fc29d38fc5bea972725df28a5

    • SSDEEP

      49152:fRrBR6Yu++p+5rPlBzzI+vq26VUZJPqyhWzXRU6l3rIDUmGhgscIa:fRNR6Yu+RrPTs+vq2DFFIlcDUBa/I

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks