General

  • Target

    a591d3d035cf90395ad1078a415a46b5b44dd813496291b702fe36cfb22dee36

  • Size

    1.0MB

  • Sample

    240628-e9kyaathpp

  • MD5

    464709f3215d06f6703eb4ecb607ae7a

  • SHA1

    1f438f2ab699f842cec119981ae5bf799df5d203

  • SHA256

    a591d3d035cf90395ad1078a415a46b5b44dd813496291b702fe36cfb22dee36

  • SHA512

    007b3d6c7da18c9d8b31991520d18fa2ee323cf8b4d8ea153d74cf93d5bfb38df79bc65a968cc6e07c996c451f0f1c8b2a0b9f0529a6b67ca148cc27adf1eda9

  • SSDEEP

    24576:3AHnh+eWsN3skA4RV1Hom2KXMmHaeAfg3sujtg5:qh+ZkldoPK8YaeAfTYg

Malware Config

Extracted

Family

redline

Botnet

wordfile

C2

185.38.142.10:7474

Targets

    • Target

      a591d3d035cf90395ad1078a415a46b5b44dd813496291b702fe36cfb22dee36

    • Size

      1.0MB

    • MD5

      464709f3215d06f6703eb4ecb607ae7a

    • SHA1

      1f438f2ab699f842cec119981ae5bf799df5d203

    • SHA256

      a591d3d035cf90395ad1078a415a46b5b44dd813496291b702fe36cfb22dee36

    • SHA512

      007b3d6c7da18c9d8b31991520d18fa2ee323cf8b4d8ea153d74cf93d5bfb38df79bc65a968cc6e07c996c451f0f1c8b2a0b9f0529a6b67ca148cc27adf1eda9

    • SSDEEP

      24576:3AHnh+eWsN3skA4RV1Hom2KXMmHaeAfg3sujtg5:qh+ZkldoPK8YaeAfTYg

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Tasks