General

  • Target

    Injector.exe

  • Size

    2.4MB

  • Sample

    220830-sada2scba8

  • MD5

    cb0145387a030a5752379a0e5d4c19ca

  • SHA1

    b8c040fbc133fb39c8081d9aa20520876f0a72af

  • SHA256

    aec0e1cfd256897d421f243f1b4cb482995ca2ef910f8b3d8113632f3e71e315

  • SHA512

    ea064ac9dae9eb91408baac94acaa2215c6e34c151d49b814740216de8e8c5c9ceac1f47a486aadeb328c22ddb0ed8913997a2517475cb906ddbd7aeeddc2ae9

  • SSDEEP

    24576:vMWtYESYcYklrbgwMWclhnYewyozyTSSOZo4ynYhLmVQLbSNdt0FdNeJFIl3RuQW:EgYPFyozyDnYhLmVQ2xIl32

Malware Config

Extracted

Family

redline

C2

193.106.191.160:8673

Attributes
  • auth_value

    ca4f0d882489c8ec9829dd7a4f352198

Targets

    • Target

      Injector.exe

    • Size

      2.4MB

    • MD5

      cb0145387a030a5752379a0e5d4c19ca

    • SHA1

      b8c040fbc133fb39c8081d9aa20520876f0a72af

    • SHA256

      aec0e1cfd256897d421f243f1b4cb482995ca2ef910f8b3d8113632f3e71e315

    • SHA512

      ea064ac9dae9eb91408baac94acaa2215c6e34c151d49b814740216de8e8c5c9ceac1f47a486aadeb328c22ddb0ed8913997a2517475cb906ddbd7aeeddc2ae9

    • SSDEEP

      24576:vMWtYESYcYklrbgwMWclhnYewyozyTSSOZo4ynYhLmVQLbSNdt0FdNeJFIl3RuQW:EgYPFyozyDnYhLmVQ2xIl32

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Tasks