General

  • Target

    Invoice.exe

  • Size

    423KB

  • Sample

    220707-kv1yvabhf6

  • MD5

    3370a4d4d6653127749ab1c1a459784e

  • SHA1

    3e32e4087039f970fe57744f58fdb920efe11e9e

  • SHA256

    0b18c0e5b68189be4c9b0cce67d7a7a8c84f49fc0dfa8998da7105e053862b5a

  • SHA512

    f9f87046118e0122f186a86e2d29e11f260a6f4d27a42759391a3acb56544295fdb9a2bad681b24c94741ac523924c65c20f733040cccffc5bd5015aa26cfa9a

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

zera.hopto.org:17939

Targets

    • Target

      Invoice.exe

    • Size

      423KB

    • MD5

      3370a4d4d6653127749ab1c1a459784e

    • SHA1

      3e32e4087039f970fe57744f58fdb920efe11e9e

    • SHA256

      0b18c0e5b68189be4c9b0cce67d7a7a8c84f49fc0dfa8998da7105e053862b5a

    • SHA512

      f9f87046118e0122f186a86e2d29e11f260a6f4d27a42759391a3acb56544295fdb9a2bad681b24c94741ac523924c65c20f733040cccffc5bd5015aa26cfa9a

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks