General

  • Target

    f9b5057081ca6e37c63a992234668b244551053a63582.exe

  • Size

    2.5MB

  • Sample

    220730-qdrxhabbe7

  • MD5

    5251c3cd61396eeb732de01832040c6f

  • SHA1

    9523aca0dacb3e25e234157b69deca035564786f

  • SHA256

    f9b5057081ca6e37c63a992234668b244551053a63582ee5bcd24e9e06222278

  • SHA512

    42c5a0a4a1fa1fcc33d4411b6b04e6061123a5b60c75a06d309693a67795fe0f2a0f77469063c3451530d8bb31093cb8fd4af3946d2deb99f751503340bd4bea

Malware Config

Extracted

Family

redline

C2

193.106.191.160:8673

Attributes
  • auth_value

    7824e9f60118486d456c723edbe36fe1

Targets

    • Target

      f9b5057081ca6e37c63a992234668b244551053a63582.exe

    • Size

      2.5MB

    • MD5

      5251c3cd61396eeb732de01832040c6f

    • SHA1

      9523aca0dacb3e25e234157b69deca035564786f

    • SHA256

      f9b5057081ca6e37c63a992234668b244551053a63582ee5bcd24e9e06222278

    • SHA512

      42c5a0a4a1fa1fcc33d4411b6b04e6061123a5b60c75a06d309693a67795fe0f2a0f77469063c3451530d8bb31093cb8fd4af3946d2deb99f751503340bd4bea

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks