General

  • Target

    win_setup__620eea0b11a3e.exe

  • Size

    7.0MB

  • Sample

    220218-bqhr2aggh2

  • MD5

    90021c53649c314350fd3e9cca970d82

  • SHA1

    b6bc62fab52efee5b2a8a930149480253bab6544

  • SHA256

    8ecab59305943daf37f9de9924dbb11ecc24f2e610c889ee4541d47bf155c7e8

  • SHA512

    616ca8784511aca210c81b43112694ca73e293d057f46f48069f5f6624163c41fcbcdb0fe9533cc85a97ae58a96716ae21f70c5fbcb997bd300921bbdcb656f0

Malware Config

Extracted

Family

redline

Botnet

media1530

C2

92.255.57.154:11841

Attributes
  • auth_value

    0fca4b66c95739362b57ce7db49c6b9e

Extracted

Family

icedid

Campaign

1860595763

Targets

    • Target

      win_setup__620eea0b11a3e.exe

    • Size

      7.0MB

    • MD5

      90021c53649c314350fd3e9cca970d82

    • SHA1

      b6bc62fab52efee5b2a8a930149480253bab6544

    • SHA256

      8ecab59305943daf37f9de9924dbb11ecc24f2e610c889ee4541d47bf155c7e8

    • SHA512

      616ca8784511aca210c81b43112694ca73e293d057f46f48069f5f6624163c41fcbcdb0fe9533cc85a97ae58a96716ae21f70c5fbcb997bd300921bbdcb656f0

    • IcedID, BokBot

      IcedID is a banking trojan capable of stealing credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Modifies Windows Firewall

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks