General

  • Target

    1d29f91a68222f8af7f6a8f175bd0789518eb8efb031157169d75e2d1a0f016d

  • Size

    207KB

  • Sample

    220909-zqktdscghm

  • MD5

    dc4b20489855d3762df820c13b064009

  • SHA1

    9f4b21154e92574c58b3d6da10463345c15afbc1

  • SHA256

    1d29f91a68222f8af7f6a8f175bd0789518eb8efb031157169d75e2d1a0f016d

  • SHA512

    1d0ce6896befb170019aa44f59cc658f3c7c360a206704fbadc759995508df48c0e91752f25627ff21b5d0abbda3914a2cf9d8b8c019987e9e5b47ea972ac6cf

  • SSDEEP

    3072:dxweYHLccSsQHp5fOUrgo/I5FDjW3whzB5ESZpzHCCZw4ji:wBLccSsQ7OUF/ITHB5EGprCC2T

Malware Config

Extracted

Family

raccoon

Botnet

567d5bff28c2a18132d2f88511f07435

C2

http://116.203.167.5/

http://195.201.248.58/

rc4.plain

Extracted

Family

redline

Botnet

1337

C2

78.153.144.6:2510

Attributes
  • auth_value

    b0447922bcbc2eda83260a9e7a638f45

Extracted

Family

redline

Botnet

nam5

C2

103.89.90.61:34589

Attributes
  • auth_value

    f23be8e9063fe5d0c6fc3ee8e7d565bd

Targets

    • Target

      1d29f91a68222f8af7f6a8f175bd0789518eb8efb031157169d75e2d1a0f016d

    • Size

      207KB

    • MD5

      dc4b20489855d3762df820c13b064009

    • SHA1

      9f4b21154e92574c58b3d6da10463345c15afbc1

    • SHA256

      1d29f91a68222f8af7f6a8f175bd0789518eb8efb031157169d75e2d1a0f016d

    • SHA512

      1d0ce6896befb170019aa44f59cc658f3c7c360a206704fbadc759995508df48c0e91752f25627ff21b5d0abbda3914a2cf9d8b8c019987e9e5b47ea972ac6cf

    • SSDEEP

      3072:dxweYHLccSsQHp5fOUrgo/I5FDjW3whzB5ESZpzHCCZw4ji:wBLccSsQ7OUF/ITHB5EGprCC2T

    • Detects Smokeloader packer

    • NetSupport

      NetSupport is a remote access tool sold as a legitimate system administration software.

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks