General

  • Target

    8.exe

  • Size

    1.4MB

  • Sample

    220411-dfwx1sbbf5

  • MD5

    d1a30dcdf2bc6b49b6472ca8bd35751b

  • SHA1

    874e9436d4f9fb6e752b5937f032186501bf16aa

  • SHA256

    03752193cdcfed264b430381b7634c2a27cce45e3c3fc0b85470017afbdb54d8

  • SHA512

    b3eeef39477c6776ad78ee14c08fff7173ae8ad7ca1caea77ae5602dd122dddfa02837d5d062eb687aa211ddc931b3d9d1c8c3725d30e684f84057aed5ee28aa

Malware Config

Extracted

Family

redline

C2

104.244.76.137:4487

Attributes
  • auth_value

    67c42657a2dc51f3323efd90a04a2b03

Targets

    • Target

      8.exe

    • Size

      1.4MB

    • MD5

      d1a30dcdf2bc6b49b6472ca8bd35751b

    • SHA1

      874e9436d4f9fb6e752b5937f032186501bf16aa

    • SHA256

      03752193cdcfed264b430381b7634c2a27cce45e3c3fc0b85470017afbdb54d8

    • SHA512

      b3eeef39477c6776ad78ee14c08fff7173ae8ad7ca1caea77ae5602dd122dddfa02837d5d062eb687aa211ddc931b3d9d1c8c3725d30e684f84057aed5ee28aa

    • PhoenixStealer

      PhoenixStealer is an information stealer written in the C++, it sends the stolen information to cybercriminals.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks