General

  • Target

    d15d3eb0_by_Libranalysis

  • Size

    7.4MB

  • Sample

    210507-levrjtnhxs

  • MD5

    d15d3eb03c466f207dd401047da792bc

  • SHA1

    cca4dd46f38bfc164a1840907a608fb657d471b0

  • SHA256

    6d0083394a549c135820010343353dcfa2929aeaa83f72a50ec60a7263f4ec90

  • SHA512

    432ff858e048358a323ed9dbbb533a2aad3648b521ffbc0e0d4cf5c02b5c65bd5b6e9f350736d65375a389efd36b4130fc1795a50f7d368a48d87afc50e7fdb4

Malware Config

Extracted

Family

redline

Botnet

@aBigF

C2

ydmau.xyz:80

Targets

    • Target

      d15d3eb0_by_Libranalysis

    • Size

      7.4MB

    • MD5

      d15d3eb03c466f207dd401047da792bc

    • SHA1

      cca4dd46f38bfc164a1840907a608fb657d471b0

    • SHA256

      6d0083394a549c135820010343353dcfa2929aeaa83f72a50ec60a7263f4ec90

    • SHA512

      432ff858e048358a323ed9dbbb533a2aad3648b521ffbc0e0d4cf5c02b5c65bd5b6e9f350736d65375a389efd36b4130fc1795a50f7d368a48d87afc50e7fdb4

    • Orcus

      Orcus is a Remote Access Trojan that is being sold on underground forums.

    • Orcus Main Payload

    • Panda Stealer Payload

    • PandaStealer

      Panda Stealer is a fork of CollectorProject Stealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Orcurs Rat Executable

    • Executes dropped EXE

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks