General

  • Target

    ae54f01f90675f9268588f7eab938ce7.exe

  • Size

    1.8MB

  • Sample

    220414-v9zpfageh3

  • MD5

    ae54f01f90675f9268588f7eab938ce7

  • SHA1

    df9b0a7a6280b8bb8bb866a672bc7ff2736c29b0

  • SHA256

    1b6dd998ab259fc57bf7d9a35381fdfe4f63f80eac561e9842613132812f165d

  • SHA512

    9616b482d4707b16b402722924c755245b36da5b44a04e59b8803058900f66be001bbd51c724bb9a10b933829a356f42f9bab9e5d55a49b60bda1b926da210ee

Malware Config

Extracted

Family

redline

Botnet

@devilstationsix66

C2

185.215.113.80:27715

Attributes
  • auth_value

    908d4628b659b61e0a6c10f5bed9fc95

Targets

    • Target

      ae54f01f90675f9268588f7eab938ce7.exe

    • Size

      1.8MB

    • MD5

      ae54f01f90675f9268588f7eab938ce7

    • SHA1

      df9b0a7a6280b8bb8bb866a672bc7ff2736c29b0

    • SHA256

      1b6dd998ab259fc57bf7d9a35381fdfe4f63f80eac561e9842613132812f165d

    • SHA512

      9616b482d4707b16b402722924c755245b36da5b44a04e59b8803058900f66be001bbd51c724bb9a10b933829a356f42f9bab9e5d55a49b60bda1b926da210ee

    • Meta Stealer Stealer

      Meta Stealer steals passwords stored in browsers, written in C++.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner Payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks