General

  • Target

    Driver Booster PRO.zip

  • Size

    2.5MB

  • Sample

    221005-1ejbvsgaaj

  • MD5

    cbfbbb9d4b5f0e396fb1731b22252a91

  • SHA1

    9f238344e8303435bf411a274e957de0833f7fb1

  • SHA256

    f694cfada7521c55767270213ce1b6c6f3bf434a376b172d5eeb5d732a1a960a

  • SHA512

    0d34342dfcb5d26c99dd55cc44484e4f321d29530af09c237e46e8bceb47b050cf2bc06daba2c2b8400eaa5847e8e0a9c4172e32153d8589cb3eac7ec2337ac8

  • SSDEEP

    49152:VTEw+CY6mxQntatsFiqpeY/92Jh/0ZMgoK+Yw9TBmrCgWqbFCrh3d:REwvYGYtsF3fkJdKUt4njFCtN

Malware Config

Extracted

Family

redline

Botnet

test

C2

89.22.238.112:16108

Attributes
  • auth_value

    53d3260e19811ed645d4695958f97695

Targets

    • Target

      Installer/installer.exe

    • Size

      573.1MB

    • MD5

      836d5c8980966392f6ef7cfa091b95c7

    • SHA1

      aa9e473c4a798a1bec3d8393b0bc91896e1075b4

    • SHA256

      53864ad6097d98c2a38b03a079f143b45e6ce1bd13ad09cb60c8852bd96882c9

    • SHA512

      fa3f348d96634656a92edb981331cb4666907993cd94932cf891d9bb10d59f7c885b5b122ca7f18e154213026d9229432873e41983214342486097c0d814e4c8

    • SSDEEP

      12288:zqFDHXF32ful4Ke0pkQ/KOvS72vFBmcjf35lN/WfidDnsjPLCorsHwVGiBFF+vm9:OFr8GEwkoKOvS72yifgfdsHwR

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks