General

  • Target

    1fa40eae5c0b4dcf0d26d10c879ad5e466c06c3fa85f70dd17aad03d5f5b0f6a

  • Size

    194KB

  • Sample

    221003-llz6mahdcp

  • MD5

    d58bd6c6616b895631445542b7b18012

  • SHA1

    ae791a19cd93dddc07d1b952bc36541c33c99856

  • SHA256

    1fa40eae5c0b4dcf0d26d10c879ad5e466c06c3fa85f70dd17aad03d5f5b0f6a

  • SHA512

    e3badfa09e33805aab49e3c08f729b4151e5c01be2b409e67ee267bc41201104d9946957c99c75cbad71e98ae7b809cd99cb9a1b5793bafe1c65df7682e55e47

  • SSDEEP

    768:YSvNWMz7EVXU/hVJ+7hSYfGJsQO849wk9ESnGCuqqyUq60atL+Qs1YQB7RgiSlmL:ZI47GyTGCwiSnmQUt0LB1YQds5gq+9

Malware Config

Extracted

Family

redline

Botnet

Neo3

C2

tyastazirowi.xyz:80

yaterirennin.xyz:80

Attributes
  • auth_value

    646532deba483490225021877e8b02a0

Targets

    • Target

      1fa40eae5c0b4dcf0d26d10c879ad5e466c06c3fa85f70dd17aad03d5f5b0f6a

    • Size

      194KB

    • MD5

      d58bd6c6616b895631445542b7b18012

    • SHA1

      ae791a19cd93dddc07d1b952bc36541c33c99856

    • SHA256

      1fa40eae5c0b4dcf0d26d10c879ad5e466c06c3fa85f70dd17aad03d5f5b0f6a

    • SHA512

      e3badfa09e33805aab49e3c08f729b4151e5c01be2b409e67ee267bc41201104d9946957c99c75cbad71e98ae7b809cd99cb9a1b5793bafe1c65df7682e55e47

    • SSDEEP

      768:YSvNWMz7EVXU/hVJ+7hSYfGJsQO849wk9ESnGCuqqyUq60atL+Qs1YQB7RgiSlmL:ZI47GyTGCwiSnmQUt0LB1YQds5gq+9

    • Detects Smokeloader packer

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

2
T1005

Tasks