General

  • Target

    1503f2e404478dc43ea0e311a4df610d1c20fb553f6925e39301a7de17529454.exe

  • Size

    4.5MB

  • Sample

    250221-ckpttszrfk

  • MD5

    b631b2198b2c67e7052bbf17d1ce2651

  • SHA1

    c0fe93eb842494177f99a10276bcd2fb67ec5e91

  • SHA256

    1503f2e404478dc43ea0e311a4df610d1c20fb553f6925e39301a7de17529454

  • SHA512

    60778c247e00fe42574911aa84baf1748428a17eec35214414c00b391d2dfe4c617963df4e53e8c32e746db27f1a2e1269f8f8d5d1c3ac481054a445ca4d645c

  • SSDEEP

    49152:BRrBR6Yu++GZu/6MB6JFqv7j6SUZJPqyhWzXRU6l3rIDUmGhgscIa:BRNR6Yu+Y/6X/qv7jaFFIlcDUBa/I

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

103.84.89.222:33791

Targets

    • Target

      1503f2e404478dc43ea0e311a4df610d1c20fb553f6925e39301a7de17529454.exe

    • Size

      4.5MB

    • MD5

      b631b2198b2c67e7052bbf17d1ce2651

    • SHA1

      c0fe93eb842494177f99a10276bcd2fb67ec5e91

    • SHA256

      1503f2e404478dc43ea0e311a4df610d1c20fb553f6925e39301a7de17529454

    • SHA512

      60778c247e00fe42574911aa84baf1748428a17eec35214414c00b391d2dfe4c617963df4e53e8c32e746db27f1a2e1269f8f8d5d1c3ac481054a445ca4d645c

    • SSDEEP

      49152:BRrBR6Yu++GZu/6MB6JFqv7j6SUZJPqyhWzXRU6l3rIDUmGhgscIa:BRNR6Yu+Y/6X/qv7jaFFIlcDUBa/I

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks