General

  • Target

    76e1d32e444437378a8561d13a082d31e0fc35effeb46cc618c82a4ed98db622

  • Size

    147KB

  • Sample

    221001-sdwlssgbf9

  • MD5

    c779fcb5cc0d9aab1fc562beed400340

  • SHA1

    0857be4eb8b5f05622ef63ce7b937327082526bd

  • SHA256

    76e1d32e444437378a8561d13a082d31e0fc35effeb46cc618c82a4ed98db622

  • SHA512

    8ea533d441772e61714dcf8d0972c9854e206fa3a468f64b8eec39f1bc74c356f01596f12a1d349a19f9f4357827e5d30cd486fa48837f08850abfdd29b66d9a

  • SSDEEP

    1536:Ph6KfBz0nY6/Fpx2yZRLS5XUawg6TsEhJR0MQBxHWTgxB/sgGkvUH5+ls:PhB88yZRWBUaGQEhJRABxOOBszY9ls

Malware Config

Extracted

Family

redline

Botnet

fud

C2

45.15.156.7:48638

Attributes
  • auth_value

    da2faefdcf53c9d85fcbb82d0cbf4876

Targets

    • Target

      76e1d32e444437378a8561d13a082d31e0fc35effeb46cc618c82a4ed98db622

    • Size

      147KB

    • MD5

      c779fcb5cc0d9aab1fc562beed400340

    • SHA1

      0857be4eb8b5f05622ef63ce7b937327082526bd

    • SHA256

      76e1d32e444437378a8561d13a082d31e0fc35effeb46cc618c82a4ed98db622

    • SHA512

      8ea533d441772e61714dcf8d0972c9854e206fa3a468f64b8eec39f1bc74c356f01596f12a1d349a19f9f4357827e5d30cd486fa48837f08850abfdd29b66d9a

    • SSDEEP

      1536:Ph6KfBz0nY6/Fpx2yZRLS5XUawg6TsEhJR0MQBxHWTgxB/sgGkvUH5+ls:PhB88yZRWBUaGQEhJRABxOOBszY9ls

    • Detects Smokeloader packer

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks