General

  • Target

    278354cec44960f94d8bda95c6a44a30.exe

  • Size

    1.5MB

  • Sample

    211031-hgcmzsffb8

  • MD5

    278354cec44960f94d8bda95c6a44a30

  • SHA1

    18283423b9861cb7605ae29ca017f73d9d70a91e

  • SHA256

    366fd1b85db7bccfb5884996d3ed5542a733fade1d927d48ba88972f50d3baec

  • SHA512

    8c1395c643839556ec402cfc0d0b2f653dd8874a8e5b6c28015df7354f06584e7c6a3c1c5f531b491ac4ead7f3ced91bd347ea5d67f52d274e2ad5580eafa3df

Malware Config

Extracted

Family

redline

Botnet

@kugurtilzt

C2

185.215.113.79:41465

Targets

    • Target

      278354cec44960f94d8bda95c6a44a30.exe

    • Size

      1.5MB

    • MD5

      278354cec44960f94d8bda95c6a44a30

    • SHA1

      18283423b9861cb7605ae29ca017f73d9d70a91e

    • SHA256

      366fd1b85db7bccfb5884996d3ed5542a733fade1d927d48ba88972f50d3baec

    • SHA512

      8c1395c643839556ec402cfc0d0b2f653dd8874a8e5b6c28015df7354f06584e7c6a3c1c5f531b491ac4ead7f3ced91bd347ea5d67f52d274e2ad5580eafa3df

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks