General

  • Target

    263E7FBF72BD53E3793128E84B0A10837BC5712095E9EE46A9B1DCA0EE059A59

  • Size

    2.5MB

  • Sample

    220812-a4yvqsghc7

  • MD5

    bd5c4985195e675f6f2dd7743e451551

  • SHA1

    f314911b7443dece9544b5f8e2b52df3d323bc0a

  • SHA256

    263e7fbf72bd53e3793128e84b0a10837bc5712095e9ee46a9b1dca0ee059a59

  • SHA512

    116b85a314a1ff0f43eb1e1ee96704191e98460e9af7aec473ceff0b66d7339a6751f305740848cefa55f4c33fd0e236b9dc4196e607296eed3018aafaa524e7

Malware Config

Extracted

Family

redline

C2

62.204.41.141:24758

Attributes
  • auth_value

    6b23940bb97470910c89668d85ae8df9

Targets

    • Target

      263E7FBF72BD53E3793128E84B0A10837BC5712095E9EE46A9B1DCA0EE059A59

    • Size

      2.5MB

    • MD5

      bd5c4985195e675f6f2dd7743e451551

    • SHA1

      f314911b7443dece9544b5f8e2b52df3d323bc0a

    • SHA256

      263e7fbf72bd53e3793128e84b0a10837bc5712095e9ee46a9b1dca0ee059a59

    • SHA512

      116b85a314a1ff0f43eb1e1ee96704191e98460e9af7aec473ceff0b66d7339a6751f305740848cefa55f4c33fd0e236b9dc4196e607296eed3018aafaa524e7

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks