General

  • Target

    hgty.bin

  • Size

    1.6MB

  • Sample

    211028-t3fsbagffp

  • MD5

    97b1b0eb2864514c1bd17dc2479fd392

  • SHA1

    1e0db2c33bac2abf8cf5883f779b0fb34e63d7c7

  • SHA256

    7bd1800901f644312525102786765942f63e164618b076d1e9c7d77e8c055e19

  • SHA512

    c1940f8b49298f37e2fe23f2ac1fdb35144f09f77d4d58da96f748c78bac2f56f0b90dc19faf02c1a8d3d9992a1b34bb2d2c7c7ec71eab304151c3c843edbc59

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://xuiklxus.xyz/hfile.bin

Targets

    • Target

      hgty.bin

    • Size

      1.6MB

    • MD5

      97b1b0eb2864514c1bd17dc2479fd392

    • SHA1

      1e0db2c33bac2abf8cf5883f779b0fb34e63d7c7

    • SHA256

      7bd1800901f644312525102786765942f63e164618b076d1e9c7d77e8c055e19

    • SHA512

      c1940f8b49298f37e2fe23f2ac1fdb35144f09f77d4d58da96f748c78bac2f56f0b90dc19faf02c1a8d3d9992a1b34bb2d2c7c7ec71eab304151c3c843edbc59

    • Modifies Windows Defender Real-time Protection settings

    • Modifies Windows Defender notification settings

    • Modifies security service

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • suricata: ET MALWARE Likely Evil Macro EXE DL mar 28 2016

      suricata: ET MALWARE Likely Evil Macro EXE DL mar 28 2016

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

3
T1031

Registry Run Keys / Startup Folder

1
T1060

BITS Jobs

1
T1197

Hidden Files and Directories

1
T1158

Defense Evasion

Modify Registry

4
T1112

Disabling Security Tools

2
T1089

File Deletion

2
T1107

BITS Jobs

1
T1197

Hidden Files and Directories

1
T1158

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Remote System Discovery

1
T1018

Collection

Data from Local System

2
T1005

Impact

Inhibit System Recovery

2
T1490

Tasks