General

  • Target

    2d97f9172f4ca5cc797189f727b04f4766cbf7141ea10ae32a76cd7fe3170102

  • Size

    693KB

  • Sample

    250220-cap2vatpgk

  • MD5

    374f8da083ce9e4a1ae01b2f53b89d3a

  • SHA1

    d9d8957a0e8449bfd57ea5d25797faf30a582920

  • SHA256

    2d97f9172f4ca5cc797189f727b04f4766cbf7141ea10ae32a76cd7fe3170102

  • SHA512

    8e970420e75fe7f96759b4b749ea4e7d5c0043456823b2acb602ee00bd6b06227abc88577dac41c77b7f1e3e1513be7d02c2019944d405c9a59f29570c767d93

  • SSDEEP

    12288:1Wi++I5SD94HIpZJRMKSuCs4ctQlCSLsQfIJDt9afnben:DnqHIkGFtQlCSL9wJDnavben

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

185.222.58.44:55615

Targets

    • Target

      Pictures.exe

    • Size

      877KB

    • MD5

      5fe61dbd19271b37f733be749530031f

    • SHA1

      51e489aa4b73aac7c6116a3de0ad1e03fd0716c8

    • SHA256

      ab82349ff6e283c364a3188708ac4d581782d072a9e9c04c8381fbd1bec4cfea

    • SHA512

      dfa10f1e1620c9861ca6bb9b7f3b1aa82e3f41457b52f2d5273d1e4ce07df28ec429f4a1dc7b3c61892d9a404ea58b25926aaf0d58966d167180d615c908707e

    • SSDEEP

      12288:yZFKLCVORpMn++jGNXzDn47MpFFjMKSucsiYJOlAStqwfGJD192hsilrUSX59:sOdxW7MOGtJOlAStHeJDv2qqUe9

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks