General

  • Target

    Installer.rar

  • Size

    5.2MB

  • Sample

    220805-bb2xcsebdm

  • MD5

    b00d0f05bae2aeeaaa1f4773ec8e7c55

  • SHA1

    0dacdea1d730258689e1d6c39261de7fd79b3d18

  • SHA256

    3a358eb87597461480a5ad40c1d4e5ab736e4eba08cb98d7bd66bec837aea42c

  • SHA512

    9c9441063c880809b43aab465e1876e07e39bdcf245b35952453cb4ce80193469bf83f658f1e45f5e940ea873c601319b4a474e643b6c2829ca22cf4d13917d8

Malware Config

Extracted

Family

redline

Botnet

cc

C2

31.41.244.109:3590

Attributes
  • auth_value

    7c92cd877c035439a140a8047908d9e1

Targets

    • Target

      Installer/Setup.exe

    • Size

      4.8MB

    • MD5

      e802a10b92d452355473e7098127cd6a

    • SHA1

      fcf838237925661f674be8b121c4989c091ed9fd

    • SHA256

      ffa88e2f4c4cffc25cfa7e87f7b8685e5e31f3dfa372e9e0a4c5d85f880dbb94

    • SHA512

      b5f2255f8507b9c5fb1671500c6a1b4b3a34428552e494f8c4a6a9713304c18d79a930f6b3716971c903c4cd79a681b5bc998cff835b2e5794cc081b2ca27128

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks