General

  • Target

    RFQ-ELITE INDUSTRIAL MARINE PROJECT.exe

  • Size

    613KB

  • Sample

    250409-qjffna1nt6

  • MD5

    0f358d948a39fa160f08b2a8e786da30

  • SHA1

    50f44f050d5290917fdddd6460012380ceab1af4

  • SHA256

    b7da8e57884104384c9b20ff8fe96c7d2447c28641f48f9250eeb0e70d848dcd

  • SHA512

    baffc94524e6bcc33d9eed1005531a0d3ea5a06307f32cb923f2421c15ba95919131a215d715b9a15fd6a9ee65a670f1d2067fc5e354e4f7cf07fbd322492e8f

  • SSDEEP

    12288:yX6okzyo6/8eWBThtKIwBD5fKC/h8751sel5BUSOd8NrR:yX6dIuJhtrwd1KC/h8/sel5BUvd+R

Malware Config

Extracted

Family

redline

Botnet

vex4you

C2

209.38.151.4:55123

Targets

    • Target

      RFQ-ELITE INDUSTRIAL MARINE PROJECT.exe

    • Size

      613KB

    • MD5

      0f358d948a39fa160f08b2a8e786da30

    • SHA1

      50f44f050d5290917fdddd6460012380ceab1af4

    • SHA256

      b7da8e57884104384c9b20ff8fe96c7d2447c28641f48f9250eeb0e70d848dcd

    • SHA512

      baffc94524e6bcc33d9eed1005531a0d3ea5a06307f32cb923f2421c15ba95919131a215d715b9a15fd6a9ee65a670f1d2067fc5e354e4f7cf07fbd322492e8f

    • SSDEEP

      12288:yX6okzyo6/8eWBThtKIwBD5fKC/h8751sel5BUSOd8NrR:yX6dIuJhtrwd1KC/h8/sel5BUvd+R

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v16

Tasks