General

  • Target

    GrandTheftAutoVcheat.exe

  • Size

    421KB

  • Sample

    220811-thcj6ahchm

  • MD5

    58fc3bb157e30334818c6f8a184ed14a

  • SHA1

    e89d26ebdd8585840094db45d60968455bcfd822

  • SHA256

    0c30a372c59133044f5e0c6c7a4779515f64b2a3f03c0ee66549c3216873a1dd

  • SHA512

    91a4cfe6cbab2db859eec1c0e24da16c77d88d17d9355ada82ab4728cd7b522387c864a6c379313f75f1334d4e78322cc7808d25703f3c72bcc74e56438ad895

Malware Config

Extracted

Family

redline

Botnet

@foruman

C2

185.106.92.226:40788

Attributes
  • auth_value

    bd15c39173a26033961a0c806b2b4684

Extracted

Family

colibri

Version

1.2.0

Botnet

Build1

C2

http://zpltcmgodhvvedxtfcygvbgjkvgvcguygytfigj.cc/gate.php

http://yugyuvyugguitgyuigtfyutdtoghghbbgyv.cx/gate.php

Targets

    • Target

      GrandTheftAutoVcheat.exe

    • Size

      421KB

    • MD5

      58fc3bb157e30334818c6f8a184ed14a

    • SHA1

      e89d26ebdd8585840094db45d60968455bcfd822

    • SHA256

      0c30a372c59133044f5e0c6c7a4779515f64b2a3f03c0ee66549c3216873a1dd

    • SHA512

      91a4cfe6cbab2db859eec1c0e24da16c77d88d17d9355ada82ab4728cd7b522387c864a6c379313f75f1334d4e78322cc7808d25703f3c72bcc74e56438ad895

    • Colibri Loader

      A loader sold as MaaS first seen in August 2021.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks