General

  • Target

    6410f4bc5d7a56d4af850984b05b149a.exe

  • Size

    893KB

  • Sample

    220706-tgryfsggb3

  • MD5

    6410f4bc5d7a56d4af850984b05b149a

  • SHA1

    07b105db29418af54a19426d7bd9959a16ad0575

  • SHA256

    cd6a8e6b17a1ecb5aafb24ef4f7ec0ba0be44508ea10dbde551e0037220571f8

  • SHA512

    fc0ab672676b206eb7eafd882fd5d56e3d0a64b6dad0862624fe34fb9085a1b59a67958c4d8cebc0154b940440ead70b6072658e7dac08b011c8124c4d3aa4c3

Malware Config

Extracted

Family

redline

Botnet

ch

C2

34.174.95.150:54865

Targets

    • Target

      6410f4bc5d7a56d4af850984b05b149a.exe

    • Size

      893KB

    • MD5

      6410f4bc5d7a56d4af850984b05b149a

    • SHA1

      07b105db29418af54a19426d7bd9959a16ad0575

    • SHA256

      cd6a8e6b17a1ecb5aafb24ef4f7ec0ba0be44508ea10dbde551e0037220571f8

    • SHA512

      fc0ab672676b206eb7eafd882fd5d56e3d0a64b6dad0862624fe34fb9085a1b59a67958c4d8cebc0154b940440ead70b6072658e7dac08b011c8124c4d3aa4c3

    • Detect Neshta Payload

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Enterprise v6

Tasks