General

  • Target

    8E008WFBBHVMQ0GV.doc

  • Size

    70KB

  • Sample

    210420-fc6ym2e2ee

  • MD5

    4aee2fac47757d476bfcf89663a58ae6

  • SHA1

    d8727d2d44b5c513e7d566933d3fdaefae9c3b25

  • SHA256

    dbdbd2f069d8c41604a87f4038c37444538f6e1d4ddf0516b8ee4c5a2ef9fec5

  • SHA512

    1d645f4cd18d3b228247d8403ecd1eb6529cbc2579800623bcd74138e2dfa8be1add8521481fd69f72305545ba450dcd329a15058dca65b7efe583d951f17193

Malware Config

Extracted

Family

redline

Botnet

version_4

C2

135.125.166.131:60294

Targets

    • Target

      8E008WFBBHVMQ0GV.doc

    • Size

      70KB

    • MD5

      4aee2fac47757d476bfcf89663a58ae6

    • SHA1

      d8727d2d44b5c513e7d566933d3fdaefae9c3b25

    • SHA256

      dbdbd2f069d8c41604a87f4038c37444538f6e1d4ddf0516b8ee4c5a2ef9fec5

    • SHA512

      1d645f4cd18d3b228247d8403ecd1eb6529cbc2579800623bcd74138e2dfa8be1add8521481fd69f72305545ba450dcd329a15058dca65b7efe583d951f17193

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks