General

  • Target

    04cef594f1da98042a382a72dd520bc3.exe

  • Size

    327KB

  • Sample

    220928-l9m6zafeg3

  • MD5

    04cef594f1da98042a382a72dd520bc3

  • SHA1

    bca1216af90849926e59f171bb604d354789b256

  • SHA256

    a27b8247b250cc81af64776356a4399d6d36ec4e3b15e484e2ebae60fbd77040

  • SHA512

    cdb7c32f76c35b2362e097f82d3beeb2bf301d6d089dc56751ecc8fdb7787f8084401baa118b65a0505e2c3616e23e4808e34fd89f51cf87955f1c7bdc128aeb

  • SSDEEP

    6144:UPraMk1vb9Xv6DK7lP6WSH30OjnigabwVfs:UPraFb9Zd6FEGiB

Malware Config

Extracted

Family

redline

Botnet

981705428_pjm12r96

C2

179.43.175.170:38766

Attributes
  • auth_value

    863097aff7128c494bbb9b4c949876ce

Extracted

Family

redline

Botnet

dfg

C2

janolavave.xyz:80

Attributes
  • auth_value

    10f346d0770417f0d92818aeec31441b

Extracted

Family

redline

Botnet

11

C2

51.89.201.21:7161

Attributes
  • auth_value

    e6aadafed1fda7723d7655a5894828d2

Extracted

Family

redline

Botnet

fud

C2

45.15.156.7:48638

Attributes
  • auth_value

    da2faefdcf53c9d85fcbb82d0cbf4876

Targets

    • Target

      04cef594f1da98042a382a72dd520bc3.exe

    • Size

      327KB

    • MD5

      04cef594f1da98042a382a72dd520bc3

    • SHA1

      bca1216af90849926e59f171bb604d354789b256

    • SHA256

      a27b8247b250cc81af64776356a4399d6d36ec4e3b15e484e2ebae60fbd77040

    • SHA512

      cdb7c32f76c35b2362e097f82d3beeb2bf301d6d089dc56751ecc8fdb7787f8084401baa118b65a0505e2c3616e23e4808e34fd89f51cf87955f1c7bdc128aeb

    • SSDEEP

      6144:UPraMk1vb9Xv6DK7lP6WSH30OjnigabwVfs:UPraFb9Zd6FEGiB

    • Detects Smokeloader packer

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks