General

  • Target

    file.exe

  • Size

    508KB

  • Sample

    220829-a1r8saaaf8

  • MD5

    3907564e810a21f65284e0695cda199a

  • SHA1

    f606b9a56887244e6ee5888e1fde324e9bbe23cb

  • SHA256

    1579a9fa0f89cae6b7eb9d7af508959b32cd05b00091744ac1b0fff61ab91d79

  • SHA512

    9fb62510ddf7bdf41afc692d5264f39e9afc100ca325b084764a1eadb4b00660148965dedc711b53c916a28d7b24e327cf2fb884cad660de7785e91c85c3d4f2

  • SSDEEP

    12288:T6MFe3Y+yMT529YNZn+yR9VBNMTzwZU87m:T6Ie3YLMUONJBIzwZU8C

Malware Config

Extracted

Family

redline

C2

138.201.195.134:3202

Attributes
  • auth_value

    af24ca30b63542f0e4d58adbf1dd4817

Extracted

Family

colibri

Version

1.2.0

Botnet

Build1

C2

http://zpltcmgodhvvedxtfcygvbgjkvgvcguygytfigj.cc/gate.php

http://yugyuvyugguitgyuigtfyutdtoghghbbgyv.cx/gate.php

Targets

    • Target

      file.exe

    • Size

      508KB

    • MD5

      3907564e810a21f65284e0695cda199a

    • SHA1

      f606b9a56887244e6ee5888e1fde324e9bbe23cb

    • SHA256

      1579a9fa0f89cae6b7eb9d7af508959b32cd05b00091744ac1b0fff61ab91d79

    • SHA512

      9fb62510ddf7bdf41afc692d5264f39e9afc100ca325b084764a1eadb4b00660148965dedc711b53c916a28d7b24e327cf2fb884cad660de7785e91c85c3d4f2

    • SSDEEP

      12288:T6MFe3Y+yMT529YNZn+yR9VBNMTzwZU87m:T6Ie3YLMUONJBIzwZU8C

    • Colibri Loader

      A loader sold as MaaS first seen in August 2021.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks