General

  • Target

    a410935df72f79ea065d92b0036b287c.exe

  • Size

    4.5MB

  • Sample

    220414-slqqhsdbeq

  • MD5

    a410935df72f79ea065d92b0036b287c

  • SHA1

    28465a4ab42d116fe260e103557b60dca92e02ce

  • SHA256

    98fea55f7585644b6f43651491e22f91fd57a1b99c4320c11a0f67ce7c486885

  • SHA512

    359f3c9af3a2968a0be4952bc2b286db670e546ac0232a0c0ac6fe39347c485e1ac140755be5c9e45606f5a02354802b1a6699bccf6e56ad1435105471c6d03d

Malware Config

Extracted

Family

redline

Botnet

10

C2

185.183.32.227:80

Attributes
  • auth_value

    187348b4b0ba6b71d26eaf47eb720dc2

Targets

    • Target

      a410935df72f79ea065d92b0036b287c.exe

    • Size

      4.5MB

    • MD5

      a410935df72f79ea065d92b0036b287c

    • SHA1

      28465a4ab42d116fe260e103557b60dca92e02ce

    • SHA256

      98fea55f7585644b6f43651491e22f91fd57a1b99c4320c11a0f67ce7c486885

    • SHA512

      359f3c9af3a2968a0be4952bc2b286db670e546ac0232a0c0ac6fe39347c485e1ac140755be5c9e45606f5a02354802b1a6699bccf6e56ad1435105471c6d03d

    • Meta Stealer Stealer

      Meta Stealer steals passwords stored in browsers, written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks