General

  • Target

    446d6030adeb99441e4d80536b1c19bce3c779987f534ba967c771612c94abaf

  • Size

    492KB

  • Sample

    250224-ffpvta1kgk

  • MD5

    42a3958f54cf2d91d0d2d7a28134dc8d

  • SHA1

    390126338bd3416587dfcdc31a18a8917e4a1ffe

  • SHA256

    446d6030adeb99441e4d80536b1c19bce3c779987f534ba967c771612c94abaf

  • SHA512

    7076d2f7c6e0f62283c1996f646d537a545e0a723032c15146a06bad197eac25673e8f4eb3231b98cbd5d0973ce183d9e7fdafc2fad2789d37eb1dc5d00d43f8

  • SSDEEP

    12288:4xmam+P6G/LDYxre5ywNlzPMLGLyaTgVuGp5NreCaOlHr:26MLDDhzEKLyaTgVnpXlHr

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

185.222.58.229:55615

Targets

    • Target

      SPECIFICATION & SAMPLES.exe

    • Size

      583KB

    • MD5

      935639e0a777039f7920146166a39e8b

    • SHA1

      720a8a07d7645c1871a850de4887f593fe7384a1

    • SHA256

      03bdfee3da39b03b4dfb1df74f0873d6d00e34c560505bd7b120f632404d5a1c

    • SHA512

      03e6bab45395407aff4ac325f25ff7503a5e1a62a071cdc689bebd398a1c33fb0cfbbee2e8fc30c5ff6523e5082f7194ae474f168b8b2c92d5e3b380c054e5bc

    • SSDEEP

      12288:2Mr8Il6dYeXY/e1fG/LLYZne5EU/zqAn8NvGXyaPelSGBXdOSgOuNPT:2MrbMR9MLLdtQNvMyaPelDBXYzT

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks