General

  • Target

    af477d25b88a0059ec73f7f595437162.exe

  • Size

    163KB

  • Sample

    220821-qb3afsced5

  • MD5

    af477d25b88a0059ec73f7f595437162

  • SHA1

    7b13ff0f521763da35e136b910418f13d0b0fb88

  • SHA256

    fae6e271a14675614d3d808555963b31b8e03bad2400f87f2cd2767628b077e5

  • SHA512

    304ae1af571f3f442b3945969476de810aec38e36affa87577ede7746704f13ae4bee0a870bed9ec1d055b7b34d4879af154eae6ebd9b127a545fea12c809624

  • SSDEEP

    3072:bvhwm6lzJUY8k2yIBZf32NwNOUTEcwZMtVAHvTpxEIE6wVWd2T0U5bXF:D4CY8xZfywNPQ1ZK2pCIUwdTU5Z

Malware Config

Extracted

Family

redline

Botnet

V3Cryptex

C2

194.36.177.60:81

Attributes
  • auth_value

    574bd465901175470b08af8d1a301beb

Targets

    • Target

      af477d25b88a0059ec73f7f595437162.exe

    • Size

      163KB

    • MD5

      af477d25b88a0059ec73f7f595437162

    • SHA1

      7b13ff0f521763da35e136b910418f13d0b0fb88

    • SHA256

      fae6e271a14675614d3d808555963b31b8e03bad2400f87f2cd2767628b077e5

    • SHA512

      304ae1af571f3f442b3945969476de810aec38e36affa87577ede7746704f13ae4bee0a870bed9ec1d055b7b34d4879af154eae6ebd9b127a545fea12c809624

    • SSDEEP

      3072:bvhwm6lzJUY8k2yIBZf32NwNOUTEcwZMtVAHvTpxEIE6wVWd2T0U5bXF:D4CY8xZfywNPQ1ZK2pCIUwdTU5Z

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Tasks