General

  • Target

    Xeron_Scan110021000031.exe

  • Size

    1.4MB

  • Sample

    201222-nxgey7hmwx

  • MD5

    4e1406afc51c4e025b73c69c9aa9bf2b

  • SHA1

    8bbcb2bfedff8af68ed1ec7e5acc63efb71f04ef

  • SHA256

    c715ed6cedff9258971fb50de1ad4ae28fe6cd55e650e8679db1c1468edf5201

  • SHA512

    86ce32fc164d85e00fb415e984091ebcf67ccd89787de13197181e3351ce144852f5c7d9ff706828dd7500de62b8bea375c878917640d08a747757788910a1a4

Malware Config

Targets

    • Target

      Xeron_Scan110021000031.exe

    • Size

      1.4MB

    • MD5

      4e1406afc51c4e025b73c69c9aa9bf2b

    • SHA1

      8bbcb2bfedff8af68ed1ec7e5acc63efb71f04ef

    • SHA256

      c715ed6cedff9258971fb50de1ad4ae28fe6cd55e650e8679db1c1468edf5201

    • SHA512

      86ce32fc164d85e00fb415e984091ebcf67ccd89787de13197181e3351ce144852f5c7d9ff706828dd7500de62b8bea375c878917640d08a747757788910a1a4

    • Modifies WinLogon for persistence

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks