General

  • Target

    680F28FC36441A05EF4A4A19B64EE60C73C2FB9653D26B028D64E93ABA781B32

  • Size

    2.5MB

  • Sample

    220812-beek8shag5

  • MD5

    b93ca6dd6a570b6737c161a6c02e4c47

  • SHA1

    d97c8f1fa60237963a61b2320aa43c01b8987634

  • SHA256

    680f28fc36441a05ef4a4a19b64ee60c73c2fb9653d26b028d64e93aba781b32

  • SHA512

    37728d2af479067109ae9177b1a4a19e9f40bead9ed112e5b52bf4618b97f8a620597ff4e66e464196076321513a069d709f62ea92ae179c23a18296ef8c88c6

Malware Config

Extracted

Family

redline

C2

185.215.113.23:15912

Attributes
  • auth_value

    ca11d6bb68385493a28fdddb02897eaf

Targets

    • Target

      680F28FC36441A05EF4A4A19B64EE60C73C2FB9653D26B028D64E93ABA781B32

    • Size

      2.5MB

    • MD5

      b93ca6dd6a570b6737c161a6c02e4c47

    • SHA1

      d97c8f1fa60237963a61b2320aa43c01b8987634

    • SHA256

      680f28fc36441a05ef4a4a19b64ee60c73c2fb9653d26b028d64e93aba781b32

    • SHA512

      37728d2af479067109ae9177b1a4a19e9f40bead9ed112e5b52bf4618b97f8a620597ff4e66e464196076321513a069d709f62ea92ae179c23a18296ef8c88c6

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Tasks