General

  • Target

    8ae918087ca5f8a69dc2a4df7e1615c76d3dbc6c36f6813a0b86fa4a9c4cf895

  • Size

    508KB

  • Sample

    240623-a45chswfpl

  • MD5

    531cdd1ad3c8459531e4d4300b8df171

  • SHA1

    5bb607a26c03b9ee81dd1f5036dfe4f7960ef9c9

  • SHA256

    8ae918087ca5f8a69dc2a4df7e1615c76d3dbc6c36f6813a0b86fa4a9c4cf895

  • SHA512

    ff0c58321e87bea8e3e34c759b034548d6d8103cbc811707218af2a72d6eab07599d57838f4f415fc2861280e9d7ab472c145f39a89a2df334d361be2a6f3b05

  • SSDEEP

    12288:L8H5wYCWeWncJn5nS9vPRnYdBz7zUY/Ag/jZ1ynMAVMpkR:gSYC0ImvPszcYXl8/M0

Malware Config

Extracted

Family

redline

Botnet

Hanna

C2

185.216.70.15:65012

Targets

    • Target

      8ae918087ca5f8a69dc2a4df7e1615c76d3dbc6c36f6813a0b86fa4a9c4cf895

    • Size

      508KB

    • MD5

      531cdd1ad3c8459531e4d4300b8df171

    • SHA1

      5bb607a26c03b9ee81dd1f5036dfe4f7960ef9c9

    • SHA256

      8ae918087ca5f8a69dc2a4df7e1615c76d3dbc6c36f6813a0b86fa4a9c4cf895

    • SHA512

      ff0c58321e87bea8e3e34c759b034548d6d8103cbc811707218af2a72d6eab07599d57838f4f415fc2861280e9d7ab472c145f39a89a2df334d361be2a6f3b05

    • SSDEEP

      12288:L8H5wYCWeWncJn5nS9vPRnYdBz7zUY/Ag/jZ1ynMAVMpkR:gSYC0ImvPszcYXl8/M0

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks