General

  • Target

    ec2ca2ff8d09bcb2927d3253ed19d477e6e97fd0e793dcf10e2c1be4112ce73a

  • Size

    2.3MB

  • Sample

    220602-rdpyksbhgr

  • MD5

    68418bc5b18bc847343c4714398144cf

  • SHA1

    9bdc01db48598d8e7fea54a10182c240522fa7f2

  • SHA256

    ec2ca2ff8d09bcb2927d3253ed19d477e6e97fd0e793dcf10e2c1be4112ce73a

  • SHA512

    5598578dc9deb44669a5832a11e53399680b15bb312bb6970cab5dea14b31ba7b257f17e7acf7394f37e81850261a0a078dc4947a5befb682f188aa589b45acc

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @mr_golds)

C2

109.107.185.135:9303

Attributes
  • auth_value

    d72163e211dc5f86585328318a5a5a13

Targets

    • Target

      ec2ca2ff8d09bcb2927d3253ed19d477e6e97fd0e793dcf10e2c1be4112ce73a

    • Size

      2.3MB

    • MD5

      68418bc5b18bc847343c4714398144cf

    • SHA1

      9bdc01db48598d8e7fea54a10182c240522fa7f2

    • SHA256

      ec2ca2ff8d09bcb2927d3253ed19d477e6e97fd0e793dcf10e2c1be4112ce73a

    • SHA512

      5598578dc9deb44669a5832a11e53399680b15bb312bb6970cab5dea14b31ba7b257f17e7acf7394f37e81850261a0a078dc4947a5befb682f188aa589b45acc

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01

      suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01

    • suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload

      suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Collection

Email Collection

1
T1114

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks