General

  • Target

    1a7c9d8e7b948a22d8f4fe7e5b104261b2c0dde0ae7e956abb0891b6e02d55cf

  • Size

    191KB

  • Sample

    220809-169m5ahbam

  • MD5

    9a06d23974e9cf0cb052aef8aead3c6e

  • SHA1

    5d61cd43b5be3dcb2f41898c91f336d043ba35a9

  • SHA256

    1a7c9d8e7b948a22d8f4fe7e5b104261b2c0dde0ae7e956abb0891b6e02d55cf

  • SHA512

    3cd8f08bdb5fbcdabbb23a4e06784816398895957d7efc991fe5955d2ce814b2f5bcba91101c357710de65bfaa99aa28fbfafb2b12a192e3f45a6c77c8f75266

Malware Config

Extracted

Family

redline

Botnet

after8

C2

185.106.92.56:48079

Attributes
  • auth_value

    cac85741280bc7db83835e5a0ca51c93

Targets

    • Target

      1a7c9d8e7b948a22d8f4fe7e5b104261b2c0dde0ae7e956abb0891b6e02d55cf

    • Size

      191KB

    • MD5

      9a06d23974e9cf0cb052aef8aead3c6e

    • SHA1

      5d61cd43b5be3dcb2f41898c91f336d043ba35a9

    • SHA256

      1a7c9d8e7b948a22d8f4fe7e5b104261b2c0dde0ae7e956abb0891b6e02d55cf

    • SHA512

      3cd8f08bdb5fbcdabbb23a4e06784816398895957d7efc991fe5955d2ce814b2f5bcba91101c357710de65bfaa99aa28fbfafb2b12a192e3f45a6c77c8f75266

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks