General

  • Target

    beca004dfd77f218a00baeb20a2e0d26ffcb0e8c88abc1fcdec9b8b78e289255

  • Size

    317KB

  • Sample

    220927-m8zztaedhk

  • MD5

    d8ca08b15c1a43f966db8f84bae5e678

  • SHA1

    2402d7403a9af170d7e6296268f24dcfc5c0f277

  • SHA256

    beca004dfd77f218a00baeb20a2e0d26ffcb0e8c88abc1fcdec9b8b78e289255

  • SHA512

    5927c31941690f796d90861147857fd47daa8f9844fe07b5fc4a5c1b638fe7dde2710174209111ff1ace7b7d900fdb0031e8ff79259dfeea40351f22f3aa377d

  • SSDEEP

    3072:OaXPELJFcIttkaeB251cVM5ZlPrZJaaAKV0KwSxceEwM/h3BsxkgaBChU/pZa9uF:O62+HrV2Z4afV00ZnigabwVf

Malware Config

Extracted

Family

redline

Botnet

11

C2

77.73.134.27:7161

Attributes
  • auth_value

    e6aadafed1fda7723d7655a5894828d2

Extracted

Family

redline

Botnet

inslab26

C2

185.182.194.25:8251

Attributes
  • auth_value

    7c9cbd0e489a3c7fd31006406cb96f5b

Targets

    • Target

      beca004dfd77f218a00baeb20a2e0d26ffcb0e8c88abc1fcdec9b8b78e289255

    • Size

      317KB

    • MD5

      d8ca08b15c1a43f966db8f84bae5e678

    • SHA1

      2402d7403a9af170d7e6296268f24dcfc5c0f277

    • SHA256

      beca004dfd77f218a00baeb20a2e0d26ffcb0e8c88abc1fcdec9b8b78e289255

    • SHA512

      5927c31941690f796d90861147857fd47daa8f9844fe07b5fc4a5c1b638fe7dde2710174209111ff1ace7b7d900fdb0031e8ff79259dfeea40351f22f3aa377d

    • SSDEEP

      3072:OaXPELJFcIttkaeB251cVM5ZlPrZJaaAKV0KwSxceEwM/h3BsxkgaBChU/pZa9uF:O62+HrV2Z4afV00ZnigabwVf

    • Detects Smokeloader packer

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks