General

  • Target

    613bdc17f7d492cc6f14bbd7651d17e8.exe

  • Size

    43KB

  • Sample

    220930-zyandsfghj

  • MD5

    613bdc17f7d492cc6f14bbd7651d17e8

  • SHA1

    10ab0fba1d4f303135357dd6494a259413136586

  • SHA256

    3c6956b942e54a47a01471139a60081ed790c96a1af0e5c2e194eea5904ab036

  • SHA512

    c8e7e7b743b8eec08e3c9bc0825087a04c5cc1a7876561c8b831e62b43bfce52747544af611addf26876c7e8093f407943fe615b4d711d5e170833a5678e117e

  • SSDEEP

    768:Os5snhwotZFLyGH5TRTq2MrxzQkb7BOd0DPILc2AD2VE69twf+:XCnhwGO28Xb7BU0DPvNf+

Malware Config

Extracted

Family

redline

Botnet

HEXO-SOFTWARE

C2

amrican-sport-live-stream.cc:4581

Attributes
  • auth_value

    fea440ffae02b6f56d7b00fe8105ccb8

Targets

    • Target

      613bdc17f7d492cc6f14bbd7651d17e8.exe

    • Size

      43KB

    • MD5

      613bdc17f7d492cc6f14bbd7651d17e8

    • SHA1

      10ab0fba1d4f303135357dd6494a259413136586

    • SHA256

      3c6956b942e54a47a01471139a60081ed790c96a1af0e5c2e194eea5904ab036

    • SHA512

      c8e7e7b743b8eec08e3c9bc0825087a04c5cc1a7876561c8b831e62b43bfce52747544af611addf26876c7e8093f407943fe615b4d711d5e170833a5678e117e

    • SSDEEP

      768:Os5snhwotZFLyGH5TRTq2MrxzQkb7BOd0DPILc2AD2VE69twf+:XCnhwGO28Xb7BU0DPvNf+

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks