General

  • Target

    63782ba80479efb33857f5803dd7edcca86d44b817d2bfc6e6030131fe243eee

  • Size

    877KB

  • Sample

    211130-mxfrssefhp

  • MD5

    0b7cda3631ee14a0d0c3da4ec649bcc4

  • SHA1

    c4ae4859b6aa6721da0ea6502e15e8f27d51ccca

  • SHA256

    63782ba80479efb33857f5803dd7edcca86d44b817d2bfc6e6030131fe243eee

  • SHA512

    2a9074b7ff70cbc922b89f39aeff5d9a0c5d1a21fa25b7eeedae07683b9359c3b3a2c1f2fa5bdb77860d26340690f11b52d8b0cc55d7bdae624a70e86d13defd

Malware Config

Extracted

Family

redline

C2

185.215.113.57:50723

Extracted

Family

redline

Botnet

LastLovely

C2

95.181.152.177:21142

Targets

    • Target

      63782ba80479efb33857f5803dd7edcca86d44b817d2bfc6e6030131fe243eee

    • Size

      877KB

    • MD5

      0b7cda3631ee14a0d0c3da4ec649bcc4

    • SHA1

      c4ae4859b6aa6721da0ea6502e15e8f27d51ccca

    • SHA256

      63782ba80479efb33857f5803dd7edcca86d44b817d2bfc6e6030131fe243eee

    • SHA512

      2a9074b7ff70cbc922b89f39aeff5d9a0c5d1a21fa25b7eeedae07683b9359c3b3a2c1f2fa5bdb77860d26340690f11b52d8b0cc55d7bdae624a70e86d13defd

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks