General

  • Target

    Loader.exe

  • Size

    1.4MB

  • Sample

    220728-xlbzksacc3

  • MD5

    78f68a0fb5f0c24f041645df00699aec

  • SHA1

    1a17d9a718205e6ea91e24968f992c1247f2e4e8

  • SHA256

    a57a23a46090a1f301b6023fef51c92783314dbd152ddbe02a487de001ff0fef

  • SHA512

    2bddb8e8278d45f37f3bb3ed1877c5eef3b04828503abca2993ad0a4cb83b49143bb73351e0c65174fbebede9172317dea9ddac3b21643c17370f5dc94826d23

Malware Config

Extracted

Family

redline

C2

62.204.41.141:24758

Attributes
  • auth_value

    8a4b9f14d6658418ac4f4ee97fa35533

Targets

    • Target

      Loader.exe

    • Size

      1.4MB

    • MD5

      78f68a0fb5f0c24f041645df00699aec

    • SHA1

      1a17d9a718205e6ea91e24968f992c1247f2e4e8

    • SHA256

      a57a23a46090a1f301b6023fef51c92783314dbd152ddbe02a487de001ff0fef

    • SHA512

      2bddb8e8278d45f37f3bb3ed1877c5eef3b04828503abca2993ad0a4cb83b49143bb73351e0c65174fbebede9172317dea9ddac3b21643c17370f5dc94826d23

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks