General

  • Target

    c31fb830f85a7db6f3081241c1f5ab1ed84badd6d5a6db08965400af2ed76e44

  • Size

    307KB

  • Sample

    220910-q9tqzadhem

  • MD5

    cc23105d16dfa6f0c4f5f059b289660c

  • SHA1

    460976fabd5ef8fd6220b4f7c7f244510ad07d11

  • SHA256

    c31fb830f85a7db6f3081241c1f5ab1ed84badd6d5a6db08965400af2ed76e44

  • SHA512

    0c596105cf365add731dbc8a05159536d3f440d8d539218ab4d3d72f16918737323270c17130a6cdbd73260ae25904aa81dd0b43788a460f958165f07b0c373e

  • SSDEEP

    6144:l+ZqKd3bt2FaAxz+9camkxEbVTtTxynHK4s7hpZr9OJxzVu1z:l7Kd3gaM+cBmEbVT/yHKp/9OJDs

Malware Config

Extracted

Family

redline

Botnet

1337

C2

78.153.144.6:2510

Attributes
  • auth_value

    b0447922bcbc2eda83260a9e7a638f45

Extracted

Family

redline

Botnet

nam5

C2

103.89.90.61:34589

Attributes
  • auth_value

    f23be8e9063fe5d0c6fc3ee8e7d565bd

Extracted

Family

raccoon

Botnet

567d5bff28c2a18132d2f88511f07435

C2

http://116.203.167.5/

http://195.201.248.58/

rc4.plain

Targets

    • Target

      c31fb830f85a7db6f3081241c1f5ab1ed84badd6d5a6db08965400af2ed76e44

    • Size

      307KB

    • MD5

      cc23105d16dfa6f0c4f5f059b289660c

    • SHA1

      460976fabd5ef8fd6220b4f7c7f244510ad07d11

    • SHA256

      c31fb830f85a7db6f3081241c1f5ab1ed84badd6d5a6db08965400af2ed76e44

    • SHA512

      0c596105cf365add731dbc8a05159536d3f440d8d539218ab4d3d72f16918737323270c17130a6cdbd73260ae25904aa81dd0b43788a460f958165f07b0c373e

    • SSDEEP

      6144:l+ZqKd3bt2FaAxz+9camkxEbVTtTxynHK4s7hpZr9OJxzVu1z:l7Kd3gaM+cBmEbVT/yHKp/9OJDs

    • NetSupport

      NetSupport is a remote access tool sold as a legitimate system administration software.

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks