General

  • Target

    0d49e0aa22dcd18bb09a175de65764c2667a8524fca4d8138439bad28dcc5b18

  • Size

    301KB

  • Sample

    220916-tl3kragbf7

  • MD5

    3d3f636b69be16bbc9b2050c0a248852

  • SHA1

    63741ebe6b98d66228a7caa92fd216b7541fbd34

  • SHA256

    0d49e0aa22dcd18bb09a175de65764c2667a8524fca4d8138439bad28dcc5b18

  • SHA512

    ae2498e579e8f7298eb15c0a2446f76583a1b7fa604dbea8c48a7544c612a92547350bd06bfbd126c1ef541030572fb39845ab5a75a08fe7c8f20e02298294d8

  • SSDEEP

    6144:x4+XRD5SjsiEvxAU3ZL7vZ0w+zJ3qSnigabwVf:xhXRD5S9EJAcZL7CVJi

Malware Config

Extracted

Family

redline

Botnet

noviy

C2

157.90.19.174:23447

Attributes
  • auth_value

    9a329af57ce39a0a4f8e36dbf6cd6106

Targets

    • Target

      0d49e0aa22dcd18bb09a175de65764c2667a8524fca4d8138439bad28dcc5b18

    • Size

      301KB

    • MD5

      3d3f636b69be16bbc9b2050c0a248852

    • SHA1

      63741ebe6b98d66228a7caa92fd216b7541fbd34

    • SHA256

      0d49e0aa22dcd18bb09a175de65764c2667a8524fca4d8138439bad28dcc5b18

    • SHA512

      ae2498e579e8f7298eb15c0a2446f76583a1b7fa604dbea8c48a7544c612a92547350bd06bfbd126c1ef541030572fb39845ab5a75a08fe7c8f20e02298294d8

    • SSDEEP

      6144:x4+XRD5SjsiEvxAU3ZL7vZ0w+zJ3qSnigabwVf:xhXRD5S9EJAcZL7CVJi

    • Detects Smokeloader packer

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks