General

  • Target

    d274a261a4e2c05a917b78dfb781bcdd18ea8ea55b431d18d4c3199f3a5fb0d4

  • Size

    153KB

  • Sample

    220926-s95vcabcb6

  • MD5

    48d2686afcdc7084a861c2896273b6ad

  • SHA1

    4b9cff07b29f49442295afe3712250a67be9e3f8

  • SHA256

    d274a261a4e2c05a917b78dfb781bcdd18ea8ea55b431d18d4c3199f3a5fb0d4

  • SHA512

    d2c99fd6cdf5fbf39c4c9ff1297f0fe9b6fc499c4c19bebd35ae2e54766cf6edd469684a664a473585113911bfd79054a79e4dc9c11b3a0dca6be28d95020028

  • SSDEEP

    3072:8RSiVTc5W52K7vbPcjjRpMqsJmFbZD3HqrBbZU9Rv5B:UPzroMqAmFbB3KCR

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @mr_golds)

C2

77.73.134.27:7161

Attributes
  • auth_value

    4b2de03af6b6ac513ac597c2e6c1ad51

Extracted

Family

redline

Botnet

inslab26

C2

185.182.194.25:8251

Attributes
  • auth_value

    7c9cbd0e489a3c7fd31006406cb96f5b

Extracted

Family

redline

Botnet

installskript

C2

185.224.133.182:16382

Attributes
  • auth_value

    f7f5626eb8e9e541c2d17255f9d8f755

Extracted

Family

danabot

Attributes
  • embedded_hash

    6618C163D57D6441FCCA65D86C4D380D

  • type

    loader

Targets

    • Target

      d274a261a4e2c05a917b78dfb781bcdd18ea8ea55b431d18d4c3199f3a5fb0d4

    • Size

      153KB

    • MD5

      48d2686afcdc7084a861c2896273b6ad

    • SHA1

      4b9cff07b29f49442295afe3712250a67be9e3f8

    • SHA256

      d274a261a4e2c05a917b78dfb781bcdd18ea8ea55b431d18d4c3199f3a5fb0d4

    • SHA512

      d2c99fd6cdf5fbf39c4c9ff1297f0fe9b6fc499c4c19bebd35ae2e54766cf6edd469684a664a473585113911bfd79054a79e4dc9c11b3a0dca6be28d95020028

    • SSDEEP

      3072:8RSiVTc5W52K7vbPcjjRpMqsJmFbZD3HqrBbZU9Rv5B:UPzroMqAmFbB3KCR

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Detects Smokeloader packer

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Tasks