General

  • Target

    b7b407d27da2cb25f7762c1346c2d39f970bca7bbd65c668aac18c90f88ab2d3

  • Size

    4.5MB

  • Sample

    220805-pvl7xaaeam

  • MD5

    10a5e7d6a22913e2396c8b55a1cc3753

  • SHA1

    fe3d862d80cafceb203bc429258a92f568cebde6

  • SHA256

    b7b407d27da2cb25f7762c1346c2d39f970bca7bbd65c668aac18c90f88ab2d3

  • SHA512

    d713b7d16f01c42cec294eaf081cd73749822cfde298e2f060d44200b1a7cab1076ea5b6d907e2e7952a1d8d26f01ddea9f2760f34813c477baa759c12aa432a

Malware Config

Extracted

Family

redline

C2

185.200.191.18:80

Attributes
  • auth_value

    f7903777691eaec1059d585ff58166bc

Targets

    • Target

      b7b407d27da2cb25f7762c1346c2d39f970bca7bbd65c668aac18c90f88ab2d3

    • Size

      4.5MB

    • MD5

      10a5e7d6a22913e2396c8b55a1cc3753

    • SHA1

      fe3d862d80cafceb203bc429258a92f568cebde6

    • SHA256

      b7b407d27da2cb25f7762c1346c2d39f970bca7bbd65c668aac18c90f88ab2d3

    • SHA512

      d713b7d16f01c42cec294eaf081cd73749822cfde298e2f060d44200b1a7cab1076ea5b6d907e2e7952a1d8d26f01ddea9f2760f34813c477baa759c12aa432a

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks