General

  • Target

    setup.exe

  • Size

    7.8MB

  • Sample

    220812-fn4zpsbdf9

  • MD5

    785ec578688eea5954c58fc5aaae01db

  • SHA1

    631e3dcb1e26ca403dcb27b3b8ca02e43fb7f892

  • SHA256

    de422863cd1d6fc32ed020e93643e24f11dfed84d7ac62de2b8e9d0b38563237

  • SHA512

    085683845f328b1675676297bbaec7634daf8aae4391d82fc66bbad6a36b1f630a6ab7184b3ad7701fb1922d53bab8f70101261124bc3bb85e1b8a8e964f20eb

Malware Config

Extracted

Family

redline

C2

185.200.191.18:80

Attributes
  • auth_value

    34e02e45e2e86edae48817cd60b40271

Targets

    • Target

      setup.exe

    • Size

      7.8MB

    • MD5

      785ec578688eea5954c58fc5aaae01db

    • SHA1

      631e3dcb1e26ca403dcb27b3b8ca02e43fb7f892

    • SHA256

      de422863cd1d6fc32ed020e93643e24f11dfed84d7ac62de2b8e9d0b38563237

    • SHA512

      085683845f328b1675676297bbaec7634daf8aae4391d82fc66bbad6a36b1f630a6ab7184b3ad7701fb1922d53bab8f70101261124bc3bb85e1b8a8e964f20eb

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks