General

  • Target

    3b45cb925d25aaf9d3019c4ca1efc6fae72edf501580deb90fb176240f554acc

  • Size

    493KB

  • Sample

    250409-jcf1aattdt

  • MD5

    2e579dfc841ab313a1e87bab08877fa0

  • SHA1

    82a69f4b47ff01e37c1e2bc1428529f5dd53ef32

  • SHA256

    3b45cb925d25aaf9d3019c4ca1efc6fae72edf501580deb90fb176240f554acc

  • SHA512

    48243241456d1d1dc09a713ef9e3f464549849b84518ba3de355920ea90d992afdc5fe930e7a0df17e170d1fa0c805aef1962139d529091c38001025f5d71e85

  • SSDEEP

    12288:YS9zEsdp2J1eJwDURAqRQp10695Mrq/gDRJS6AXFonyEAaScpwCnCTy:b9zESyYODUWqE55Mrqw2mJzSsN

Malware Config

Extracted

Family

redline

Botnet

vex4you

C2

209.38.151.4:55123

Targets

    • Target

      RFQ-ELITE INDUSTRIAL MARINE PROJECT.exe

    • Size

      613KB

    • MD5

      0f358d948a39fa160f08b2a8e786da30

    • SHA1

      50f44f050d5290917fdddd6460012380ceab1af4

    • SHA256

      b7da8e57884104384c9b20ff8fe96c7d2447c28641f48f9250eeb0e70d848dcd

    • SHA512

      baffc94524e6bcc33d9eed1005531a0d3ea5a06307f32cb923f2421c15ba95919131a215d715b9a15fd6a9ee65a670f1d2067fc5e354e4f7cf07fbd322492e8f

    • SSDEEP

      12288:yX6okzyo6/8eWBThtKIwBD5fKC/h8751sel5BUSOd8NrR:yX6dIuJhtrwd1KC/h8/sel5BUvd+R

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v16

Tasks