Resubmissions

10-05-2021 11:09

210510-cdf8nml7an 10

General

  • Target

    e95d92772e18190dbde834744c74aa2ab7fda3b01e1ca839fabb8a4285b4e148

  • Size

    1.6MB

  • Sample

    210510-cdf8nml7an

  • MD5

    16a11f50f6925fca61040f2e0a834b89

  • SHA1

    4179ea5b096750082e177dddedf3a46f1576ef91

  • SHA256

    e95d92772e18190dbde834744c74aa2ab7fda3b01e1ca839fabb8a4285b4e148

  • SHA512

    309b46e3e09e77a96a3ecc06a06a62fc7111e15383aefb8eed8c9be11c700774749d55f6dd7e2fb172bc74525a52c888e9aac6c49b217e4a0bc3b247676a075c

Malware Config

Extracted

Family

redline

C2

zastaredan.xyz:80

Extracted

Family

icedid

Campaign

687839456

C2

icouldmakeyoubelieve.top

Targets

    • Target

      e95d92772e18190dbde834744c74aa2ab7fda3b01e1ca839fabb8a4285b4e148

    • Size

      1.6MB

    • MD5

      16a11f50f6925fca61040f2e0a834b89

    • SHA1

      4179ea5b096750082e177dddedf3a46f1576ef91

    • SHA256

      e95d92772e18190dbde834744c74aa2ab7fda3b01e1ca839fabb8a4285b4e148

    • SHA512

      309b46e3e09e77a96a3ecc06a06a62fc7111e15383aefb8eed8c9be11c700774749d55f6dd7e2fb172bc74525a52c888e9aac6c49b217e4a0bc3b247676a075c

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

BITS Jobs

1
T1197

Defense Evasion

BITS Jobs

1
T1197

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks