General

  • Target

    Fervent.exe

  • Size

    4.4MB

  • Sample

    220707-17x1qagbf7

  • MD5

    a63f8ced63c68c15ca3401e70f7ec4b5

  • SHA1

    2cf95005a6a38fa95353b7b1cb4d00ce2740279a

  • SHA256

    ad3768805a846789d53d50f7503afd8e9490180bf83b476f8c0f81a0ac3f16e7

  • SHA512

    42a761a8b3641ba34f276c1376fed400737b4857a3b810d2e7bf6f153abd5737ba6807edcefeb9cc473eb09575f7a003586a0252e0fb1075cff5d6178135c33e

Malware Config

Extracted

Family

redline

Botnet

1488

C2

46.21.250.111:65367

Attributes
  • auth_value

    e1f55d6c61f97af563fc8c06a2c97666

Targets

    • Target

      Fervent.exe

    • Size

      4.4MB

    • MD5

      a63f8ced63c68c15ca3401e70f7ec4b5

    • SHA1

      2cf95005a6a38fa95353b7b1cb4d00ce2740279a

    • SHA256

      ad3768805a846789d53d50f7503afd8e9490180bf83b476f8c0f81a0ac3f16e7

    • SHA512

      42a761a8b3641ba34f276c1376fed400737b4857a3b810d2e7bf6f153abd5737ba6807edcefeb9cc473eb09575f7a003586a0252e0fb1075cff5d6178135c33e

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks