General

  • Target

    SecuriteInfo.com.Exploit.CVE-2018-0798.4.28409.18163.rtf

  • Size

    11KB

  • Sample

    220928-j4earsfdc5

  • MD5

    05085c14cefd400244d373752d6c6f8a

  • SHA1

    d58212b162345e387e4f1a3cd0ccb3da2eff2354

  • SHA256

    b2064763e0decfa14ca91e0052b4b88210415f2ae792336702d196deefbf7461

  • SHA512

    8984a3260401167f781604ddb1abf2d4ac0c6c679c34c352134139276591275ef2f001b2ef8db4cca66b8852e6e9b0bed025cb33ea4fe7cf6f262ff1d5cdf4f3

  • SSDEEP

    192:pmvntCjhSyhW4Mv1B+1gZP9QkdP9nPUz6Vvzo75tO4sxIJAiE0v/wFZMNG3sjDv6:UV6hlyB+1wZ8uVvzodA4sxIJAp0HoyNG

Malware Config

Extracted

Family

redline

Botnet

sirus

C2

147.124.223.126:4444

Targets

    • Target

      SecuriteInfo.com.Exploit.CVE-2018-0798.4.28409.18163.rtf

    • Size

      11KB

    • MD5

      05085c14cefd400244d373752d6c6f8a

    • SHA1

      d58212b162345e387e4f1a3cd0ccb3da2eff2354

    • SHA256

      b2064763e0decfa14ca91e0052b4b88210415f2ae792336702d196deefbf7461

    • SHA512

      8984a3260401167f781604ddb1abf2d4ac0c6c679c34c352134139276591275ef2f001b2ef8db4cca66b8852e6e9b0bed025cb33ea4fe7cf6f262ff1d5cdf4f3

    • SSDEEP

      192:pmvntCjhSyhW4Mv1B+1gZP9QkdP9nPUz6Vvzo75tO4sxIJAiE0v/wFZMNG3sjDv6:UV6hlyB+1wZ8uVvzodA4sxIJAp0HoyNG

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Exploitation for Client Execution

1
T1203

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks