General

  • Target

    tmp

  • Size

    3.0MB

  • Sample

    220827-y3c4msgef7

  • MD5

    0730caf5a88ec99420f192f98bfa07d8

  • SHA1

    5830ffc1e922e8a3cd64c5d6593ae2ef33da25a1

  • SHA256

    049726de878da8b7385b3f2a6223902e302ec9fac95d46ab5268bfe1aed094ca

  • SHA512

    bcb82242dd7a8759d247eb3252c60f73f781e4156d77fa2990e43bdbe58af9b7deb2921ea17348dbb60b5940a1a903d34799cc9c622596f0a70d4add2a466e94

  • SSDEEP

    49152:qqZH7ZkIFkIpoCkZVyEwuiRnQ/GRZ9j9EpOExENF/0S4fydRtlyZK4V5UVaVylO:nvk29miaY2pOXMS4fErymKUO

Malware Config

Extracted

Family

redline

C2

185.200.191.18:80

Attributes
  • auth_value

    a11ae941038a2a4398d552996dbd03f1

Targets

    • Target

      tmp

    • Size

      3.0MB

    • MD5

      0730caf5a88ec99420f192f98bfa07d8

    • SHA1

      5830ffc1e922e8a3cd64c5d6593ae2ef33da25a1

    • SHA256

      049726de878da8b7385b3f2a6223902e302ec9fac95d46ab5268bfe1aed094ca

    • SHA512

      bcb82242dd7a8759d247eb3252c60f73f781e4156d77fa2990e43bdbe58af9b7deb2921ea17348dbb60b5940a1a903d34799cc9c622596f0a70d4add2a466e94

    • SSDEEP

      49152:qqZH7ZkIFkIpoCkZVyEwuiRnQ/GRZ9j9EpOExENF/0S4fydRtlyZK4V5UVaVylO:nvk29miaY2pOXMS4fErymKUO

    • Modifies security service

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Possible privilege escalation attempt

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Modifies file permissions

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks