General

  • Target

    5344-1318-0x0000000000CB0000-0x0000000001128000-memory.dmp

  • Size

    4.5MB

  • Sample

    250224-rmlmhswq13

  • MD5

    622207079e4d659a10e6952366480905

  • SHA1

    0d535b551f9e70e0bb14c45c5beda4477b67083c

  • SHA256

    747b8fcca155efaf4925f59e4be462f9b6b4d4ff83919f62b83a124d03a5047e

  • SHA512

    7eddbc1fe2a8e40984b839fa57cab280939ba95d8e1cb35d6402b85962ae6f9e7babdf360402a19cfefb2e57147740c403d8fc914ed1b1b6d6a281de5a0f3ee5

  • SSDEEP

    49152:bRrBR6Yu++6ZZEQwBT1t5vL46qUZJPqyhWzXRU6l3rIDUmGhgscIa:bRNR6Yu+zEQyj5vL4iFFIlcDUBa/I

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

103.84.89.222:33791

Targets

    • Target

      5344-1318-0x0000000000CB0000-0x0000000001128000-memory.dmp

    • Size

      4.5MB

    • MD5

      622207079e4d659a10e6952366480905

    • SHA1

      0d535b551f9e70e0bb14c45c5beda4477b67083c

    • SHA256

      747b8fcca155efaf4925f59e4be462f9b6b4d4ff83919f62b83a124d03a5047e

    • SHA512

      7eddbc1fe2a8e40984b839fa57cab280939ba95d8e1cb35d6402b85962ae6f9e7babdf360402a19cfefb2e57147740c403d8fc914ed1b1b6d6a281de5a0f3ee5

    • SSDEEP

      49152:bRrBR6Yu++6ZZEQwBT1t5vL46qUZJPqyhWzXRU6l3rIDUmGhgscIa:bRNR6Yu+zEQyj5vL4iFFIlcDUBa/I

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks