General

  • Target

    942724E5CBE8F58F2D96ABB183A065AC.exe

  • Size

    4.6MB

  • Sample

    210701-9ym48he4zs

  • MD5

    942724e5cbe8f58f2d96abb183a065ac

  • SHA1

    c58bbe091e48fa33267fcffbcb5bd88f07e4aa66

  • SHA256

    83be09271b4ef2cba877418b5c73fb0a2c13e64b067f25704c0f3f444037f2d5

  • SHA512

    60534ce713b5328803bf06849a450c4449aacd49bc78bbe0d6b3e8896d8b590510c3f3af70df5cce732d96ec09ac168fc2b06097be8d13554fcb15cadb835e69

Malware Config

Extracted

Family

redline

Botnet

@dropty

C2

54.93.92.226:16656

Targets

    • Target

      942724E5CBE8F58F2D96ABB183A065AC.exe

    • Size

      4.6MB

    • MD5

      942724e5cbe8f58f2d96abb183a065ac

    • SHA1

      c58bbe091e48fa33267fcffbcb5bd88f07e4aa66

    • SHA256

      83be09271b4ef2cba877418b5c73fb0a2c13e64b067f25704c0f3f444037f2d5

    • SHA512

      60534ce713b5328803bf06849a450c4449aacd49bc78bbe0d6b3e8896d8b590510c3f3af70df5cce732d96ec09ac168fc2b06097be8d13554fcb15cadb835e69

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Tasks