General

  • Target

    280d8ac98717328877666b10a47bd686

  • Size

    1.3MB

  • Sample

    211113-b5vedabebp

  • MD5

    280d8ac98717328877666b10a47bd686

  • SHA1

    8e02e4700f050797ba5529599d18cdada7e82198

  • SHA256

    88d819e97e573477222ae60022206e9d16fabeaa10385296f403adcb2edf1bac

  • SHA512

    a7ff352227ae52a7a95fc3b9d046e4efa8c416c4a9418170169e0a618891eeb16ddd3ba8966142d665f8c778c6720b868771162099bf57cc7117211452ead2ab

Malware Config

Extracted

Family

redline

Botnet

ppg

C2

86.107.197.248:56626

Targets

    • Target

      280d8ac98717328877666b10a47bd686

    • Size

      1.3MB

    • MD5

      280d8ac98717328877666b10a47bd686

    • SHA1

      8e02e4700f050797ba5529599d18cdada7e82198

    • SHA256

      88d819e97e573477222ae60022206e9d16fabeaa10385296f403adcb2edf1bac

    • SHA512

      a7ff352227ae52a7a95fc3b9d046e4efa8c416c4a9418170169e0a618891eeb16ddd3ba8966142d665f8c778c6720b868771162099bf57cc7117211452ead2ab

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks