General

  • Target

    010ceeac59d9c3d9fc23a62939a12efa.exe

  • Size

    163KB

  • Sample

    220903-lnmnbachdp

  • MD5

    010ceeac59d9c3d9fc23a62939a12efa

  • SHA1

    3ccb428c1f59cfdae662a3d285da7de26c9ce4ce

  • SHA256

    70b7e7dd43e168f0ceeea4470c15b62337a8e47c33dec6dca9a49225816af41d

  • SHA512

    e2309374efffebd76f719f60d522a56f316eea47b7c5937cf78a3b03b64a7e308b1472b38f37591306a66126ed11bec44133f2dbc44a5ac51911873d9f100662

  • SSDEEP

    3072:bvhwm6lzJUY8k2yIBZf32NwNOUTEcwZMtVAHvTpxEIE6wVWd2T0U5bXFW:D4CY8xZfywNPQ1ZK2pCIUwdTU5ZW

Malware Config

Extracted

Family

redline

Botnet

V3Cryptex

C2

194.36.177.60:81

Attributes
  • auth_value

    574bd465901175470b08af8d1a301beb

Targets

    • Target

      010ceeac59d9c3d9fc23a62939a12efa.exe

    • Size

      163KB

    • MD5

      010ceeac59d9c3d9fc23a62939a12efa

    • SHA1

      3ccb428c1f59cfdae662a3d285da7de26c9ce4ce

    • SHA256

      70b7e7dd43e168f0ceeea4470c15b62337a8e47c33dec6dca9a49225816af41d

    • SHA512

      e2309374efffebd76f719f60d522a56f316eea47b7c5937cf78a3b03b64a7e308b1472b38f37591306a66126ed11bec44133f2dbc44a5ac51911873d9f100662

    • SSDEEP

      3072:bvhwm6lzJUY8k2yIBZf32NwNOUTEcwZMtVAHvTpxEIE6wVWd2T0U5bXFW:D4CY8xZfywNPQ1ZK2pCIUwdTU5ZW

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks