General

  • Target

    Patch.exe

  • Size

    174KB

  • Sample

    220819-1jnr5sdde5

  • MD5

    9d976aa0b7b02302e0e89466040080d0

  • SHA1

    70c91eee4491050908bb74c5c00ff0f01efff7a3

  • SHA256

    3ec60ccea3fec48d3ea33c63d7d66ec1d3badb174963e8dffe8ce528473c6886

  • SHA512

    c8b1c3ff4a21baf629147271ce57b7762e692cf94fb430b10e0eab22c0833d7881b1a6724a08844abe0dc98a4f964ef1766edbbf7515bde365a4fc453b94dfcd

  • SSDEEP

    768:rgsY7T0sl+kKGUhk6P5p32E8yNQmskkGLbvio3ZzeuOl:Hli6r2mNt0GLzl3Zc

Malware Config

Extracted

Family

redline

Botnet

1877

C2

overthinker1877.duckdns.org:60732

Extracted

Family

arkei

Botnet

Default

Targets

    • Target

      Patch.exe

    • Size

      174KB

    • MD5

      9d976aa0b7b02302e0e89466040080d0

    • SHA1

      70c91eee4491050908bb74c5c00ff0f01efff7a3

    • SHA256

      3ec60ccea3fec48d3ea33c63d7d66ec1d3badb174963e8dffe8ce528473c6886

    • SHA512

      c8b1c3ff4a21baf629147271ce57b7762e692cf94fb430b10e0eab22c0833d7881b1a6724a08844abe0dc98a4f964ef1766edbbf7515bde365a4fc453b94dfcd

    • SSDEEP

      768:rgsY7T0sl+kKGUhk6P5p32E8yNQmskkGLbvio3ZzeuOl:Hli6r2mNt0GLzl3Zc

    • Arkei

      Arkei is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks