General

  • Target

    beb38b475d203dd46d3d1fa63ca34a83df6c45775b348279a5dc19ef1a861336

  • Size

    328KB

  • Sample

    220927-z6y1ysefb6

  • MD5

    56cd93b278ab2458de2f72c977bbcbea

  • SHA1

    9c21edeb3d2552bedfaf1c9eb0e6fcf19f78d98b

  • SHA256

    beb38b475d203dd46d3d1fa63ca34a83df6c45775b348279a5dc19ef1a861336

  • SHA512

    87e06b9787a17f032999621829c2152f753ed4654efd6662613414474f6e9ed9e6c464afc93c6a848a1541e2385bd5de04fef3a8f33f6df60d7f8ea632d16831

  • SSDEEP

    3072:EzXsv40EYmGO5zU1EfF5r0fnS/BOdZw7y2exSOX40KVOM/h3BsxkgaBChU/pZa9u:Er70eSE4fn3s7RewOX40iOnigabwVfs

Malware Config

Extracted

Family

redline

Botnet

11

C2

51.89.201.21:7161

Attributes
  • auth_value

    e6aadafed1fda7723d7655a5894828d2

Extracted

Family

redline

Botnet

inslab26

C2

185.182.194.25:8251

Attributes
  • auth_value

    7c9cbd0e489a3c7fd31006406cb96f5b

Extracted

Family

redline

Botnet

981705428_wsiv2wqu

C2

179.43.175.170:38766

Attributes
  • auth_value

    ea424abde1f4c7328dd41ad4f28f74d4

Targets

    • Target

      beb38b475d203dd46d3d1fa63ca34a83df6c45775b348279a5dc19ef1a861336

    • Size

      328KB

    • MD5

      56cd93b278ab2458de2f72c977bbcbea

    • SHA1

      9c21edeb3d2552bedfaf1c9eb0e6fcf19f78d98b

    • SHA256

      beb38b475d203dd46d3d1fa63ca34a83df6c45775b348279a5dc19ef1a861336

    • SHA512

      87e06b9787a17f032999621829c2152f753ed4654efd6662613414474f6e9ed9e6c464afc93c6a848a1541e2385bd5de04fef3a8f33f6df60d7f8ea632d16831

    • SSDEEP

      3072:EzXsv40EYmGO5zU1EfF5r0fnS/BOdZw7y2exSOX40KVOM/h3BsxkgaBChU/pZa9u:Er70eSE4fn3s7RewOX40iOnigabwVfs

    • Detects Smokeloader packer

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

5
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Tasks