General

  • Target

    8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5

  • Size

    1.7MB

  • Sample

    220730-16ah2abdcn

  • MD5

    44df72212127215eff6b18cc9f250971

  • SHA1

    497cfce96217cfbbd6fcd14d9af6b6114eaecd9f

  • SHA256

    8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5

  • SHA512

    9213bcbf112e1a4ceb584292d8d86005f636b071b154ab7cee90745965e148d7e145d22d21cd15b8431a48c8c9d2b310b5ab04c06fc2a75289d020a3d1a4a03e

Malware Config

Extracted

Family

redline

C2

185.186.142.127:6737

193.106.191.160:8673

194.93.2.28:21390

Attributes
  • auth_value

    1fce8029e8fab4e62b767b33e52bdb9e

Extracted

Family

redline

Botnet

@moriwWs

C2

neredenkyor.xyz:81

Attributes
  • auth_value

    c2f987b4e6cd55ad1315311e92563eca

Targets

    • Target

      8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5

    • Size

      1.7MB

    • MD5

      44df72212127215eff6b18cc9f250971

    • SHA1

      497cfce96217cfbbd6fcd14d9af6b6114eaecd9f

    • SHA256

      8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5

    • SHA512

      9213bcbf112e1a4ceb584292d8d86005f636b071b154ab7cee90745965e148d7e145d22d21cd15b8431a48c8c9d2b310b5ab04c06fc2a75289d020a3d1a4a03e

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks