General

  • Target

    715ff963e75986124591e17cd8c6f6f6.exe

  • Size

    165KB

  • Sample

    210418-1cbyzeq612

  • MD5

    715ff963e75986124591e17cd8c6f6f6

  • SHA1

    67bec13f335787778e5b60dc339b50a1aad5ce67

  • SHA256

    1dc057c9c8e23f10e6cb6cd957a412a06c78d24dbdeb93d6d4ac83b5d0c835e1

  • SHA512

    ef6ce6546e66bdb5479bc3f0f45ea5177ab0eb217bceea2cab6e17fcc193ade3c19edc6c067441fa8169042bd23b7fa69fd7cc99dac4d4e61ff19e28ede0f924

Malware Config

Targets

    • Target

      715ff963e75986124591e17cd8c6f6f6.exe

    • Size

      165KB

    • MD5

      715ff963e75986124591e17cd8c6f6f6

    • SHA1

      67bec13f335787778e5b60dc339b50a1aad5ce67

    • SHA256

      1dc057c9c8e23f10e6cb6cd957a412a06c78d24dbdeb93d6d4ac83b5d0c835e1

    • SHA512

      ef6ce6546e66bdb5479bc3f0f45ea5177ab0eb217bceea2cab6e17fcc193ade3c19edc6c067441fa8169042bd23b7fa69fd7cc99dac4d4e61ff19e28ede0f924

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Turns off Windows Defender SpyNet reporting

    • Windows security bypass

    • Nirsoft

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks