General

  • Target

    52e1bb883b8e09f753159f4a6312b12590c53aef9cea2d608c51fc863085be90

  • Size

    465KB

  • Sample

    250408-jkbers1mz2

  • MD5

    303378dda5e2502bb8bf4dd1bf47fcf4

  • SHA1

    f9fd5cf362f697284012054fdfb75e2e24099be0

  • SHA256

    52e1bb883b8e09f753159f4a6312b12590c53aef9cea2d608c51fc863085be90

  • SHA512

    1ea175cadb21de789a8baa1a30c74151c0295a76b604526a23d9088c88731de5b99861d2a81e678fa7dc41b9c6baa395b6674303ba2197ac08db822424253019

  • SSDEEP

    12288:vCaoEZyEfrY5aHf0V/tvmVaKF/4hv9tfjkmA:qgBHf0VFeVa6/4hv9tfImA

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

45.137.22.105:55615

Targets

    • Target

      SAMPLES DRAWING & PICTURS.exe

    • Size

      520KB

    • MD5

      3e0b15798b6c27cb538668aad787cca8

    • SHA1

      35cbef46b336f9f063d4ad49ff98e10e346b2cba

    • SHA256

      f5d5b215b155bf76191567f503124575c35d80129aad17ead629674e6d618114

    • SHA512

      7782bb5fd6aa9e339fb208d1ad3fe90fec4a74201b86b4c93c29a86306b5c9699963e543e66bfb39b672b247e51a797ef1bf8d65cbdfc937064c383a2901d4fd

    • SSDEEP

      12288:3jLORFkieV5S+ErhY56Hf0f/tTj0w5IFn4TvtsfO0d1U:3vBDY1Hf0fFP0yUn4TvtsW07

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks