General

  • Target

    1e950f26e7e97d172a792b2d36178018ba500c263ff9c891eea4f91484f126b4

  • Size

    212KB

  • Sample

    220709-tkl7dahfe3

  • MD5

    7780833f0a0939009d95a9811467b718

  • SHA1

    9b35c4bf61753f3d079dd9643761225e7d11dfad

  • SHA256

    1e950f26e7e97d172a792b2d36178018ba500c263ff9c891eea4f91484f126b4

  • SHA512

    3d8e0cf6092ecdd03781b9806431cf7106519464498bdf9c2a082b06e367743f446559cec5af6f4ed42abf5d4366a4b90c2385bb52b7496afe52df159a68547a

Malware Config

Extracted

Family

redline

Botnet

proliv

C2

207.32.218.110:41679

Attributes
  • auth_value

    269555048acb082049b848d71bf26bd7

Targets

    • Target

      1e950f26e7e97d172a792b2d36178018ba500c263ff9c891eea4f91484f126b4

    • Size

      212KB

    • MD5

      7780833f0a0939009d95a9811467b718

    • SHA1

      9b35c4bf61753f3d079dd9643761225e7d11dfad

    • SHA256

      1e950f26e7e97d172a792b2d36178018ba500c263ff9c891eea4f91484f126b4

    • SHA512

      3d8e0cf6092ecdd03781b9806431cf7106519464498bdf9c2a082b06e367743f446559cec5af6f4ed42abf5d4366a4b90c2385bb52b7496afe52df159a68547a

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)

      suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

4
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

2
T1005

Email Collection

1
T1114

Tasks