General

  • Target

    a6e18bfafb3e216ca77d6f5da1cd50ab.exe

  • Size

    309KB

  • Sample

    220910-mkc55sdfdk

  • MD5

    a6e18bfafb3e216ca77d6f5da1cd50ab

  • SHA1

    585c6092b0036ee0f96032e203c0d764d1f012d5

  • SHA256

    e387e0ba5e2fb9355e78d28a92edff5479c15e327f6e4e97a3cf42c27e00e85f

  • SHA512

    f7d20c8e7aa394a66ce359286d9688d1aa0e5292dceaced469dbc69c347b807d1b102a97d4b8af04ef68ea92efa47bc752cbbe697d88ec26fcb0fd4050d1cb91

  • SSDEEP

    6144:oB1nazUTsjsAvrirn1yD0HrfdDa7MJGy4USuvf9vE1o+gfqoFLPS:oCzUjAvmrnMYHrfdDXG3mf9vE1BuqqL

Malware Config

Extracted

Family

redline

Botnet

1337

C2

78.153.144.6:2510

Attributes
  • auth_value

    b0447922bcbc2eda83260a9e7a638f45

Extracted

Family

redline

Botnet

nam5

C2

103.89.90.61:34589

Attributes
  • auth_value

    f23be8e9063fe5d0c6fc3ee8e7d565bd

Targets

    • Target

      a6e18bfafb3e216ca77d6f5da1cd50ab.exe

    • Size

      309KB

    • MD5

      a6e18bfafb3e216ca77d6f5da1cd50ab

    • SHA1

      585c6092b0036ee0f96032e203c0d764d1f012d5

    • SHA256

      e387e0ba5e2fb9355e78d28a92edff5479c15e327f6e4e97a3cf42c27e00e85f

    • SHA512

      f7d20c8e7aa394a66ce359286d9688d1aa0e5292dceaced469dbc69c347b807d1b102a97d4b8af04ef68ea92efa47bc752cbbe697d88ec26fcb0fd4050d1cb91

    • SSDEEP

      6144:oB1nazUTsjsAvrirn1yD0HrfdDa7MJGy4USuvf9vE1o+gfqoFLPS:oCzUjAvmrnMYHrfdDXG3mf9vE1BuqqL

    • Detects Smokeloader packer

    • NetSupport

      NetSupport is a remote access tool sold as a legitimate system administration software.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks