General

  • Target

    fbcd45b47c28ba4275e76079c58ce6d36386d0600d102ca29628973116a340d9

  • Size

    2.9MB

  • Sample

    220730-16bfbsbdcq

  • MD5

    aaa3dbcc297ef4ff7329d42440509fdc

  • SHA1

    30a8c945583ad1e7b1f8ce0b79ca42e11ea13cd2

  • SHA256

    fbcd45b47c28ba4275e76079c58ce6d36386d0600d102ca29628973116a340d9

  • SHA512

    2bb68efba4372294633a59d6720b87983d12bf1092dd21feb6eb8667b223cf114fa31346ec131746b92d9591202cf4934b5a0e3f8230119678d7309a0936c208

Malware Config

Extracted

Family

redline

C2

193.106.191.160:8673

194.93.2.28:21390

185.186.142.127:6737

Attributes
  • auth_value

    a92e5e3459b5f1ea8a76ec4f05c50c1e

Extracted

Family

redline

Botnet

@moriwWs

C2

neredenkyor.xyz:81

Attributes
  • auth_value

    c2f987b4e6cd55ad1315311e92563eca

Targets

    • Target

      fbcd45b47c28ba4275e76079c58ce6d36386d0600d102ca29628973116a340d9

    • Size

      2.9MB

    • MD5

      aaa3dbcc297ef4ff7329d42440509fdc

    • SHA1

      30a8c945583ad1e7b1f8ce0b79ca42e11ea13cd2

    • SHA256

      fbcd45b47c28ba4275e76079c58ce6d36386d0600d102ca29628973116a340d9

    • SHA512

      2bb68efba4372294633a59d6720b87983d12bf1092dd21feb6eb8667b223cf114fa31346ec131746b92d9591202cf4934b5a0e3f8230119678d7309a0936c208

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks