General

  • Target

    Fake Bitcoin Transaction.exe

  • Size

    593KB

  • Sample

    220906-qs6n7sagel

  • MD5

    8348bc8878f2d004c9e79b71a3a3e06b

  • SHA1

    1f1f08004124eebf132bbf743b6b70064e3b71f9

  • SHA256

    54b9b801e07066fe1769e5f9e1fac7a3271312e00b469ef52f078108d24a4f1d

  • SHA512

    93509f4ba464497005922347e57133afb6a6ebf274712f01fb3857a15cb57e6744950140ebd6a554ca9afca597641fec41848b62f83686678088d067b798c543

  • SSDEEP

    12288:sQLutGAXqsp8qTqL12eJM4cIwevZQhLv929ZjI9:sMusAXtpTi12eJM4hxZI9

Malware Config

Extracted

Family

redline

Botnet

ubivca

C2

185.106.92.228:24221

Attributes
  • auth_value

    43ba5caf87c83f17aa82312a2b9ec2de

Targets

    • Target

      Fake Bitcoin Transaction.exe

    • Size

      593KB

    • MD5

      8348bc8878f2d004c9e79b71a3a3e06b

    • SHA1

      1f1f08004124eebf132bbf743b6b70064e3b71f9

    • SHA256

      54b9b801e07066fe1769e5f9e1fac7a3271312e00b469ef52f078108d24a4f1d

    • SHA512

      93509f4ba464497005922347e57133afb6a6ebf274712f01fb3857a15cb57e6744950140ebd6a554ca9afca597641fec41848b62f83686678088d067b798c543

    • SSDEEP

      12288:sQLutGAXqsp8qTqL12eJM4cIwevZQhLv929ZjI9:sMusAXtpTi12eJM4hxZI9

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks