General

  • Target

    73E25CED557E8008074958707573A4D6AD68E3861D04A.exe

  • Size

    10.4MB

  • Sample

    220119-wxlsgsccc9

  • MD5

    304886440d86db757041b07d02af0aff

  • SHA1

    28075b86a60a4792acdfb9deb94276951203f301

  • SHA256

    73e25ced557e8008074958707573a4d6ad68e3861d04a98a22cfdaed57fab84f

  • SHA512

    c36b60449680a7948ec33523f9f3274462bc64bf823ef80dc71067dd388de029d72f2aeb7ca49b6b1e2265296554acef5574efbf31614aec76009d4f2c68cb16

Malware Config

Extracted

Family

socelars

C2

http://www.yarchworkshop.com/

Extracted

Family

redline

Botnet

@Tui

C2

185.215.113.44:23759

Extracted

Family

redline

Botnet

v2user1

C2

159.69.246.184:13127

Extracted

Family

redline

Botnet

media13n

C2

65.108.69.168:13293

Targets

    • Target

      73E25CED557E8008074958707573A4D6AD68E3861D04A.exe

    • Size

      10.4MB

    • MD5

      304886440d86db757041b07d02af0aff

    • SHA1

      28075b86a60a4792acdfb9deb94276951203f301

    • SHA256

      73e25ced557e8008074958707573a4d6ad68e3861d04a98a22cfdaed57fab84f

    • SHA512

      c36b60449680a7948ec33523f9f3274462bc64bf823ef80dc71067dd388de029d72f2aeb7ca49b6b1e2265296554acef5574efbf31614aec76009d4f2c68cb16

    • OnlyLogger

      A tiny loader that uses IPLogger to get its payload.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Socelars

      Socelars is an infostealer targeting browser cookies and credit card credentials.

    • Socelars Payload

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • OnlyLogger Payload

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Looks up geolocation information via web service

      Uses a legitimate geolocation service to find the infected system's geolocation info.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Tasks