General

  • Target

    014b2ca1f9e6ad821c1a384b9d384f31.exe

  • Size

    998KB

  • Sample

    250222-ve9wxswky8

  • MD5

    014b2ca1f9e6ad821c1a384b9d384f31

  • SHA1

    fca0ae3b21d561c530c5a52af19150100b2e0a6c

  • SHA256

    72ef04b633c90ce77442104498f7b667e6bcf0deee9c837beb54d8d3bb3503e0

  • SHA512

    26cc6baa0654d7294df5a25f67d36d66ac7f918de9e3b92476170182ba64d9a5194a710aff90b642f0c0c7d8b1f9e0030814014f1372c85016bbcfeb18d97dfe

  • SSDEEP

    12288:v6jb6G5xtiI95yS+c57boNna6xg20t4ham0gX:v05xt9E3nakiW

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

185.222.58.250:55615

Targets

    • Target

      014b2ca1f9e6ad821c1a384b9d384f31.exe

    • Size

      998KB

    • MD5

      014b2ca1f9e6ad821c1a384b9d384f31

    • SHA1

      fca0ae3b21d561c530c5a52af19150100b2e0a6c

    • SHA256

      72ef04b633c90ce77442104498f7b667e6bcf0deee9c837beb54d8d3bb3503e0

    • SHA512

      26cc6baa0654d7294df5a25f67d36d66ac7f918de9e3b92476170182ba64d9a5194a710aff90b642f0c0c7d8b1f9e0030814014f1372c85016bbcfeb18d97dfe

    • SSDEEP

      12288:v6jb6G5xtiI95yS+c57boNna6xg20t4ham0gX:v05xt9E3nakiW

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks