General

  • Target

    MTBS Enquiry Offer.exe

  • Size

    687KB

  • Sample

    250615-nkakpatmt7

  • MD5

    963f144175cb61d399c9a0358315c90b

  • SHA1

    88e4c0deb2ad55bafe79cb35485281605a17b2c0

  • SHA256

    b72fd1024afa07ad46cd25049ae1ef5e7311b1b2bae35f769263332cf2e7d17d

  • SHA512

    e1160a5f6ddba25bc79b73325bfbf328f22b6d1fb780c90c73c4c69456ab8b085f11a3c53ed7b8577338523b6f7b500fb71b784c730b3ff0114ea63b67067b08

  • SSDEEP

    12288:bshENsdARh5Kz0joVNsNktXePTl1Sx+2HwUlAUItDrcVWTl2:HRH40jQCNZ0I2HwYAjIVWTw

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

194.156.79.167:55615

Targets

    • Target

      MTBS Enquiry Offer.exe

    • Size

      687KB

    • MD5

      963f144175cb61d399c9a0358315c90b

    • SHA1

      88e4c0deb2ad55bafe79cb35485281605a17b2c0

    • SHA256

      b72fd1024afa07ad46cd25049ae1ef5e7311b1b2bae35f769263332cf2e7d17d

    • SHA512

      e1160a5f6ddba25bc79b73325bfbf328f22b6d1fb780c90c73c4c69456ab8b085f11a3c53ed7b8577338523b6f7b500fb71b784c730b3ff0114ea63b67067b08

    • SSDEEP

      12288:bshENsdARh5Kz0joVNsNktXePTl1Sx+2HwUlAUItDrcVWTl2:HRH40jQCNZ0I2HwYAjIVWTw

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v16

Tasks