General

  • Target

    0x0007000000012732-148.dat

  • Size

    1.1MB

  • Sample

    220813-wzwepscfel

  • MD5

    e392bc384c98ddd5dd55794a096ab787

  • SHA1

    afd2c5471065d10ee67d89b037360d80b9474885

  • SHA256

    944d0036c359c3406803a1b8ebb0f434e9a53bf443cce4a92038202cbfd71655

  • SHA512

    c67d2a1f8394d3a92d3f697af86efc6fc0537b1103e0e0a09710897259aa038522ca38f45e79e059866c64a85bdf70351a3ac36c73b356b704e75cc31c48fa3d

Malware Config

Extracted

Family

redline

Botnet

5

C2

176.113.115.146:9582

Attributes
  • auth_value

    d38b30c1ccd6c1e5088d9e5bd9e51b0f

Extracted

Family

redline

Botnet

5076357887

C2

195.54.170.157:16525

Attributes
  • auth_value

    0dfaff60271d374d0c206d19883e06f3

Extracted

Family

redline

Botnet

@tag12312341

C2

62.204.41.144:14096

Attributes
  • auth_value

    71466795417275fac01979e57016e277

Extracted

Family

redline

Botnet

RuXaRR_GG

C2

insttaller.com:40915

Attributes
  • auth_value

    4a733ff307847db3ee220c11d113a305

Extracted

Family

redline

Botnet

nam3

C2

103.89.90.61:34589

Attributes
  • auth_value

    64b900120bbceaa6a9c60e9079492895

Extracted

Family

redline

Botnet

ruzki 20

C2

185.106.92.235:12654

Attributes
  • auth_value

    58e0924d341a39ea656fcbe6c356ae20

Extracted

Family

redline

Botnet

1111

C2

185.106.92.228:24221

Attributes
  • auth_value

    2a33c2d7ead0c8a22693c06db06f29ee

Extracted

Family

nymaim

C2

208.67.104.9

212.192.241.16

Extracted

Family

redline

Botnet

nam6

C2

103.89.90.61:34589

Attributes
  • auth_value

    86f67819317f85546241783dd77023e2

Targets

    • Target

      0x0007000000012732-148.dat

    • Size

      1.1MB

    • MD5

      e392bc384c98ddd5dd55794a096ab787

    • SHA1

      afd2c5471065d10ee67d89b037360d80b9474885

    • SHA256

      944d0036c359c3406803a1b8ebb0f434e9a53bf443cce4a92038202cbfd71655

    • SHA512

      c67d2a1f8394d3a92d3f697af86efc6fc0537b1103e0e0a09710897259aa038522ca38f45e79e059866c64a85bdf70351a3ac36c73b356b704e75cc31c48fa3d

    • Gozi, Gozi IFSB

      Gozi ISFB is a well-known and widely distributed banking trojan.

    • Modifies Windows Defender Real-time Protection settings

    • NyMaim

      NyMaim is a malware with various capabilities written in C++ and first seen in 2013.

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Uses the VBS compiler for execution

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Persistence

Modify Existing Service

1
T1031

Defense Evasion

Modify Registry

2
T1112

Disabling Security Tools

1
T1089

Scripting

1
T1064

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks