General

  • Target

    00854e47bc6249cefca953ddc3f20f48

  • Size

    1.4MB

  • Sample

    221010-c3mgesacg9

  • MD5

    00854e47bc6249cefca953ddc3f20f48

  • SHA1

    fbec3af2ab8c29e660c86ecbf5d1c0ca7a33163d

  • SHA256

    981b59093b5e83b9956e1a191e763352ba8f270cc2e73fe1b0b172139469a1fa

  • SHA512

    1ed70afc8d7b4cc4c12c1a6e7935363caf939b4621ed26397d03eac56d8ef572dda71f3760bd84ece02f9c06f8435c330cf5dad950b56ff4f789a9eafa1ae119

  • SSDEEP

    24576:4avwvyzIdOjsYEYLKdIL6/MPDduwMFDbnquTyTUQZdBTSFSRaLSD:EyzIIe9NO9BTSFSRaeD

Malware Config

Extracted

Family

redline

C2

62.204.41.141:24758

Attributes
  • auth_value

    083a5d0777f0c1ebc3781a4df2d7b0ba

Targets

    • Target

      00854e47bc6249cefca953ddc3f20f48

    • Size

      1.4MB

    • MD5

      00854e47bc6249cefca953ddc3f20f48

    • SHA1

      fbec3af2ab8c29e660c86ecbf5d1c0ca7a33163d

    • SHA256

      981b59093b5e83b9956e1a191e763352ba8f270cc2e73fe1b0b172139469a1fa

    • SHA512

      1ed70afc8d7b4cc4c12c1a6e7935363caf939b4621ed26397d03eac56d8ef572dda71f3760bd84ece02f9c06f8435c330cf5dad950b56ff4f789a9eafa1ae119

    • SSDEEP

      24576:4avwvyzIdOjsYEYLKdIL6/MPDduwMFDbnquTyTUQZdBTSFSRaLSD:EyzIIe9NO9BTSFSRaeD

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Tasks