General

  • Target

    b84f81bdbb79467cb27775d0cc99795eaec00e65096085cce684e64db14d6f09

  • Size

    462KB

  • Sample

    250320-jmmwksxwby

  • MD5

    8a3bcff50b2682db9c977f2245ec4dc6

  • SHA1

    22cff7178c5fa26bd2a5d3ed726aaec639270082

  • SHA256

    b84f81bdbb79467cb27775d0cc99795eaec00e65096085cce684e64db14d6f09

  • SHA512

    c6bdd861b908258470abb9c69d7e4924d323b2ed21e47caafb35f0fc080e570bba72787bc8fa8f8dcaae7232fef8d71a7cf9f05dcfdff74c34331abbf08c8fe7

  • SSDEEP

    12288:yFVUK44LkmkEc/lMPz7M1RPN0S4sIpHvRigEpRuDxq2g6:yFn3kEQlMPzg1Rl07sIpHv0pRda

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

45.137.22.178:55615

Targets

    • Target

      SAMPLE PICTURES.exe

    • Size

      499KB

    • MD5

      d855d7927afb8a221096e14b494e3421

    • SHA1

      97b970f4a39ed5418c6057198ceb5c4f5b151ca2

    • SHA256

      33540347f9022510c4e5cbf6c08ef2ab908b2f6812bf6e2ef2cdbc4ee43f87d3

    • SHA512

      60486b8563e140cf8073e702daf1fb81b145d7c6ae5e941ef2650db9420653cc70064e21a263215156c35ac9cf1b560ae57441437e9eb23aa0614dcdc0c962e6

    • SSDEEP

      12288:d7XLCsp389W4y4LkqkEcplOPznM1Pvd0oO0SpQ9:xXLCsBn4JkEAlOPzM1Pl010SpQ9

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks