General

  • Target

    TikTok-Views-BOT.exe

  • Size

    11.5MB

  • Sample

    211116-psx7dsagen

  • MD5

    1f564063f2fd3e319c2669f7e29e7bd7

  • SHA1

    15492d97a4279c4e84c430194bb68323a5b4b9b2

  • SHA256

    7e6b525d20c679bb8241177f2e307bb9c5b9070e4846a033640eb45eafcf64ea

  • SHA512

    606041e1a2f48f4da30261f1b9062bf1f85f5b2fa43b6dc497acf096cb7c9124a72bd913fb7c8668d025b51596dc6951f054bdbef589a4a7f712a8fbc3caa9b9

Malware Config

Targets

    • Target

      TikTok-Views-BOT.exe

    • Size

      11.5MB

    • MD5

      1f564063f2fd3e319c2669f7e29e7bd7

    • SHA1

      15492d97a4279c4e84c430194bb68323a5b4b9b2

    • SHA256

      7e6b525d20c679bb8241177f2e307bb9c5b9070e4846a033640eb45eafcf64ea

    • SHA512

      606041e1a2f48f4da30261f1b9062bf1f85f5b2fa43b6dc497acf096cb7c9124a72bd913fb7c8668d025b51596dc6951f054bdbef589a4a7f712a8fbc3caa9b9

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • UAC bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Bypass User Account Control

1
T1088

Scheduled Task

1
T1053

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

2
T1005

Tasks