General

  • Target

    88ce28ff68c1aed67d67789260dc51fdc5ad0e7fd69c27d0f60db5214e013b24.exe

  • Size

    964KB

  • Sample

    250318-gj64yavzet

  • MD5

    14d111eba3c9ee5e36549ebad0360dbe

  • SHA1

    ee236f96bf998ec27f3e83db02af8df5ac0e3631

  • SHA256

    88ce28ff68c1aed67d67789260dc51fdc5ad0e7fd69c27d0f60db5214e013b24

  • SHA512

    d30edadffc4de7d3bb95753ef00d344c56db47593afbdea79cbc96f41caa65322c6b1997047cbdb764933e9151a7195478f06cb981aa04bdde66e8e7070eaae9

  • SSDEEP

    24576:bxLsMs8WdZ78l98ecfHOGABIe8kneSuRWu:Jsldmv89fHOz8OwWu

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

45.137.22.150:55615

Targets

    • Target

      88ce28ff68c1aed67d67789260dc51fdc5ad0e7fd69c27d0f60db5214e013b24.exe

    • Size

      964KB

    • MD5

      14d111eba3c9ee5e36549ebad0360dbe

    • SHA1

      ee236f96bf998ec27f3e83db02af8df5ac0e3631

    • SHA256

      88ce28ff68c1aed67d67789260dc51fdc5ad0e7fd69c27d0f60db5214e013b24

    • SHA512

      d30edadffc4de7d3bb95753ef00d344c56db47593afbdea79cbc96f41caa65322c6b1997047cbdb764933e9151a7195478f06cb981aa04bdde66e8e7070eaae9

    • SSDEEP

      24576:bxLsMs8WdZ78l98ecfHOGABIe8kneSuRWu:Jsldmv89fHOz8OwWu

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks