General

  • Target

    667b4975fe2cc3040ff66ec335c9cd77d13022a7f17927d321ccbc2ed00241af

  • Size

    200KB

  • Sample

    220907-l8j3xsghgn

  • MD5

    8b590d5ee71b4eabf60b84681bc61b9b

  • SHA1

    1f946058e7507ba35f482e2988723f9e28cd523b

  • SHA256

    667b4975fe2cc3040ff66ec335c9cd77d13022a7f17927d321ccbc2ed00241af

  • SHA512

    334e5355fd8a28a9416096fe7757241cc56782e6b6a5af61fcf05b50c09f520cf7855816709bfb75570ff97fb77e7bb36bb9d544924a755dfec8b81aad74c77f

  • SSDEEP

    3072:r0YPVm6ro3j8G8mzy2aGXOyTY2uxp8nGy8osNc:xPt2Vz9aFy82Wp6zsN

Malware Config

Extracted

Family

redline

Botnet

747

C2

78.153.144.6:2510

Attributes
  • auth_value

    842e51893ada92572d9bc2e846237976

Extracted

Family

redline

Botnet

nam5

C2

103.89.90.61:34589

Attributes
  • auth_value

    f23be8e9063fe5d0c6fc3ee8e7d565bd

Targets

    • Target

      667b4975fe2cc3040ff66ec335c9cd77d13022a7f17927d321ccbc2ed00241af

    • Size

      200KB

    • MD5

      8b590d5ee71b4eabf60b84681bc61b9b

    • SHA1

      1f946058e7507ba35f482e2988723f9e28cd523b

    • SHA256

      667b4975fe2cc3040ff66ec335c9cd77d13022a7f17927d321ccbc2ed00241af

    • SHA512

      334e5355fd8a28a9416096fe7757241cc56782e6b6a5af61fcf05b50c09f520cf7855816709bfb75570ff97fb77e7bb36bb9d544924a755dfec8b81aad74c77f

    • SSDEEP

      3072:r0YPVm6ro3j8G8mzy2aGXOyTY2uxp8nGy8osNc:xPt2Vz9aFy82Wp6zsN

    • Detects Smokeloader packer

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks