General

  • Target

    b92fbfb1456ffbbda1a668cba58533a7.exe

  • Size

    592KB

  • Sample

    250307-yh8d2svyhw

  • MD5

    b92fbfb1456ffbbda1a668cba58533a7

  • SHA1

    75bb0aebf4e0f239c3abb7604c1485a74b33e0c3

  • SHA256

    9ac72c52d01edd78f0012ecdd15ca8c839830c68b77681325dd11cda309eda85

  • SHA512

    71a5e7ca9df812a1fceede8218addedc2a8fce4bf92e6bb5f2ce5ae27aaf3c7825833bdc0b5b38453c4b79c041fff33ebbcda090c6664d25ad569fdb3fa2d9dc

  • SSDEEP

    12288:z/gp50g7ZeK50g73tl4dkKkpGrMY9UN0f1NSBqkhHo5zNteTgTJ74xWw:Up5F7AK5F79JpXWE+pmYygT+w

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

45.137.22.249:55615

Targets

    • Target

      b92fbfb1456ffbbda1a668cba58533a7.exe

    • Size

      592KB

    • MD5

      b92fbfb1456ffbbda1a668cba58533a7

    • SHA1

      75bb0aebf4e0f239c3abb7604c1485a74b33e0c3

    • SHA256

      9ac72c52d01edd78f0012ecdd15ca8c839830c68b77681325dd11cda309eda85

    • SHA512

      71a5e7ca9df812a1fceede8218addedc2a8fce4bf92e6bb5f2ce5ae27aaf3c7825833bdc0b5b38453c4b79c041fff33ebbcda090c6664d25ad569fdb3fa2d9dc

    • SSDEEP

      12288:z/gp50g7ZeK50g73tl4dkKkpGrMY9UN0f1NSBqkhHo5zNteTgTJ74xWw:Up5F7AK5F79JpXWE+pmYygT+w

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks