General

  • Target

    86313AF86B044FA4998F50C78A73E168D50D3A48D1E65D44584D6D5C7DF52B0D

  • Size

    2.5MB

  • Sample

    220812-bl7klahcb6

  • MD5

    98180fcc5fd2a110e991fb70573ee290

  • SHA1

    60cef139fb0b713caba022dc62f07a2a19f2fd01

  • SHA256

    86313af86b044fa4998f50c78a73e168d50d3a48d1e65d44584d6d5c7df52b0d

  • SHA512

    050a86eae43854c5858f781ed5897c6f44d467639132a5b335a523ebf294509919cb018dd782255f634efb8dc99f53c707773fff4b02ed1af5491df3af379d55

Malware Config

Extracted

Family

redline

C2

62.204.41.141:24758

Attributes
  • auth_value

    696026fc51b785eaab70bf29592a77da

Targets

    • Target

      86313AF86B044FA4998F50C78A73E168D50D3A48D1E65D44584D6D5C7DF52B0D

    • Size

      2.5MB

    • MD5

      98180fcc5fd2a110e991fb70573ee290

    • SHA1

      60cef139fb0b713caba022dc62f07a2a19f2fd01

    • SHA256

      86313af86b044fa4998f50c78a73e168d50d3a48d1e65d44584d6d5c7df52b0d

    • SHA512

      050a86eae43854c5858f781ed5897c6f44d467639132a5b335a523ebf294509919cb018dd782255f634efb8dc99f53c707773fff4b02ed1af5491df3af379d55

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks