General

  • Target

    6B801C643300C6819E5E3FB9840609F7491FF4E49A96A4CB6D52387F0DE991C7

  • Size

    2.4MB

  • Sample

    220812-be3ytshah5

  • MD5

    3e1f14eb54f59c3db7eb97f97494cd1b

  • SHA1

    7e66bb0f9ce22036fe8f0d09d37ae9d2b18bb3af

  • SHA256

    6b801c643300c6819e5e3fb9840609f7491ff4e49a96a4cb6d52387f0de991c7

  • SHA512

    bbba8d7cdc1ca2dec921fa62d9355b6010dbc91f1aa45a2ded0aa81c9a700ca5a77abd607a00d719a238a35bf9022e7aef888d6288ac3161cd8edea14932f0f2

Malware Config

Extracted

Family

redline

C2

185.215.113.83:60722

Attributes
  • auth_value

    d3bc7c214eb5756ad77bf45c13185b89

Targets

    • Target

      6B801C643300C6819E5E3FB9840609F7491FF4E49A96A4CB6D52387F0DE991C7

    • Size

      2.4MB

    • MD5

      3e1f14eb54f59c3db7eb97f97494cd1b

    • SHA1

      7e66bb0f9ce22036fe8f0d09d37ae9d2b18bb3af

    • SHA256

      6b801c643300c6819e5e3fb9840609f7491ff4e49a96a4cb6d52387f0de991c7

    • SHA512

      bbba8d7cdc1ca2dec921fa62d9355b6010dbc91f1aa45a2ded0aa81c9a700ca5a77abd607a00d719a238a35bf9022e7aef888d6288ac3161cd8edea14932f0f2

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks