General

  • Target

    b2418873bcfc63d4028e3ebada93030b77f50841862bf5bd5e3f71fe97f06c0b

  • Size

    2.2MB

  • Sample

    220805-18ycwafebm

  • MD5

    aa34aee3908cbc51054091ebff97354d

  • SHA1

    72073b055a0d9be3e720679886b7404e5a54752e

  • SHA256

    b2418873bcfc63d4028e3ebada93030b77f50841862bf5bd5e3f71fe97f06c0b

  • SHA512

    3981e2f4f934bcaa73171e8d5a221a2dc9c76d5f3fa345eab3ebf53db6f801f12512bafc5f4e7cadd7ea49395c11a3d29eaa0f65edc8123fa0c609b57e267223

Malware Config

Extracted

Family

redline

Botnet

s30

C2

185.106.92.56:48079

Attributes
  • auth_value

    4a6db50203773d46213e05773fa25935

Targets

    • Target

      b2418873bcfc63d4028e3ebada93030b77f50841862bf5bd5e3f71fe97f06c0b

    • Size

      2.2MB

    • MD5

      aa34aee3908cbc51054091ebff97354d

    • SHA1

      72073b055a0d9be3e720679886b7404e5a54752e

    • SHA256

      b2418873bcfc63d4028e3ebada93030b77f50841862bf5bd5e3f71fe97f06c0b

    • SHA512

      3981e2f4f934bcaa73171e8d5a221a2dc9c76d5f3fa345eab3ebf53db6f801f12512bafc5f4e7cadd7ea49395c11a3d29eaa0f65edc8123fa0c609b57e267223

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks