General

  • Target

    3abd9925a66cbc91c5bb9b261fe18db081581fd898b1197122c20aabf055474a

  • Size

    558KB

  • Sample

    240625-14d4fawgqg

  • MD5

    a56b296b440dd37fdc820a79373ab0d9

  • SHA1

    cc555a9ece05af0a60ebb89e5c392c6dbbedac4a

  • SHA256

    3abd9925a66cbc91c5bb9b261fe18db081581fd898b1197122c20aabf055474a

  • SHA512

    a3a6ef1824d75eacd0342a6d21b0f80bb247ccbbedebdba5e26d1cb04e5ef41be85f758957a5f704cae160e946c2757e0531b1466b0409ccc2c09bd5c2b53186

  • SSDEEP

    12288:cvVX9Koe0T8l++GpoTp2AnNtYyTlOr3++yDuzK4Y/3vw:at7e0T8l+xpoTp2ANtzlOr3+B+4/3

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

45.137.22.71:55615

Targets

    • Target

      3abd9925a66cbc91c5bb9b261fe18db081581fd898b1197122c20aabf055474a

    • Size

      558KB

    • MD5

      a56b296b440dd37fdc820a79373ab0d9

    • SHA1

      cc555a9ece05af0a60ebb89e5c392c6dbbedac4a

    • SHA256

      3abd9925a66cbc91c5bb9b261fe18db081581fd898b1197122c20aabf055474a

    • SHA512

      a3a6ef1824d75eacd0342a6d21b0f80bb247ccbbedebdba5e26d1cb04e5ef41be85f758957a5f704cae160e946c2757e0531b1466b0409ccc2c09bd5c2b53186

    • SSDEEP

      12288:cvVX9Koe0T8l++GpoTp2AnNtYyTlOr3++yDuzK4Y/3vw:at7e0T8l+xpoTp2ANtzlOr3+B+4/3

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Persistence

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Privilege Escalation

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks