General

  • Target

    2025-03-12_21536c470fe15ffb271f09a730cef39a_agent-tesla_hiddentear

  • Size

    583KB

  • Sample

    250312-cbzyfatye1

  • MD5

    21536c470fe15ffb271f09a730cef39a

  • SHA1

    534c0188bb44a6a63a25c226de1c3d7d3e8c42be

  • SHA256

    68a23a92e5e7d02bc1b19df9a41b199965e45c9e82a9921f773ac0fbd43712c7

  • SHA512

    24ca460dc96f1b71096dc83e9091257da3d71c7714879d680c42e4f1e7a494d394c31ad2244cbd1c647260309bbff1d3e540a81f48b9ba58cab95f30a54db3f5

  • SSDEEP

    12288:SfEW5TFXH2K6vwu/R++0fXN+6PGpyV3nUrseCp9YPff06odAA:NWf2HYuZ1gd+w3E3Cp9gfiA

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

207.32.218.107:64054

Targets

    • Target

      2025-03-12_21536c470fe15ffb271f09a730cef39a_agent-tesla_hiddentear

    • Size

      583KB

    • MD5

      21536c470fe15ffb271f09a730cef39a

    • SHA1

      534c0188bb44a6a63a25c226de1c3d7d3e8c42be

    • SHA256

      68a23a92e5e7d02bc1b19df9a41b199965e45c9e82a9921f773ac0fbd43712c7

    • SHA512

      24ca460dc96f1b71096dc83e9091257da3d71c7714879d680c42e4f1e7a494d394c31ad2244cbd1c647260309bbff1d3e540a81f48b9ba58cab95f30a54db3f5

    • SSDEEP

      12288:SfEW5TFXH2K6vwu/R++0fXN+6PGpyV3nUrseCp9YPff06odAA:NWf2HYuZ1gd+w3E3Cp9gfiA

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks