General

  • Target

    42bb3bbe750fb9712226e724156d6d4de98475dd2d3268a2924d19c5cd93fd13

  • Size

    269KB

  • Sample

    221009-244jrsabc6

  • MD5

    a619f6f55a7969a2ebc80c707c45c305

  • SHA1

    c916e70ef812672ff88ec246546e20915b2091e4

  • SHA256

    42bb3bbe750fb9712226e724156d6d4de98475dd2d3268a2924d19c5cd93fd13

  • SHA512

    1fb1ea64864bb0f4584bce04982ecad79e09c5f0770c2387aadb33f52e88c17735fa7375c1093424855737d8d688c0e1886583a420731b99745af49299589439

  • SSDEEP

    6144:qj39N0lFczkoAzO0C3UDfGc+4lWrwVfquS0:g3TCg/L3UDGchod

Malware Config

Extracted

Family

redline

C2

45.15.156.37:899

Attributes
  • auth_value

    5b663effac3b92fe687f0181631eeff2

Extracted

Family

raccoon

Botnet

bd3a3a503834ef8e836d8a99d1ecff54

C2

http://135.148.104.11/

rc4.plain

Targets

    • Target

      42bb3bbe750fb9712226e724156d6d4de98475dd2d3268a2924d19c5cd93fd13

    • Size

      269KB

    • MD5

      a619f6f55a7969a2ebc80c707c45c305

    • SHA1

      c916e70ef812672ff88ec246546e20915b2091e4

    • SHA256

      42bb3bbe750fb9712226e724156d6d4de98475dd2d3268a2924d19c5cd93fd13

    • SHA512

      1fb1ea64864bb0f4584bce04982ecad79e09c5f0770c2387aadb33f52e88c17735fa7375c1093424855737d8d688c0e1886583a420731b99745af49299589439

    • SSDEEP

      6144:qj39N0lFczkoAzO0C3UDfGc+4lWrwVfquS0:g3TCg/L3UDGchod

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks