Resubmissions

14/10/2022, 13:16

221014-qh1efaded6 10

14/10/2022, 06:57

221014-hqy8caced2 10

General

  • Target

    file.exe

  • Size

    301KB

  • Sample

    221014-qh1efaded6

  • MD5

    fdbdc3ebe7e613be4242099892cb2b6b

  • SHA1

    2abfdd0c1000d25e06d94e77a5c58de26b52c43a

  • SHA256

    f1a912751f4de1f7f0a4ad4a3c721112082877ef3d342968da6ae53449744ae1

  • SHA512

    9f20e5de8a8442ad44a48003122d88df727c845465924220e50a10b34f6e3977d8e76172ad58489f7112aa650637ed64730fb3f978388e5cca27e39d1d1227f6

  • SSDEEP

    96:ZbtyE1vwPEl8JQO2a4ox1DjUXgB6NgoWDPY3/brRK0r2YE7KWfgRPbbFnU:Z9vsElzON4CUXgatWDPYTdK0GuWfgJy

Malware Config

Extracted

Family

redline

Botnet

Morn

C2

80.66.87.20:80

Attributes
  • auth_value

    98b8a59d3016c72d785854c61b951f1a

Targets

    • Target

      file.exe

    • Size

      301KB

    • MD5

      fdbdc3ebe7e613be4242099892cb2b6b

    • SHA1

      2abfdd0c1000d25e06d94e77a5c58de26b52c43a

    • SHA256

      f1a912751f4de1f7f0a4ad4a3c721112082877ef3d342968da6ae53449744ae1

    • SHA512

      9f20e5de8a8442ad44a48003122d88df727c845465924220e50a10b34f6e3977d8e76172ad58489f7112aa650637ed64730fb3f978388e5cca27e39d1d1227f6

    • SSDEEP

      96:ZbtyE1vwPEl8JQO2a4ox1DjUXgB6NgoWDPY3/brRK0r2YE7KWfgRPbbFnU:Z9vsElzON4CUXgatWDPYTdK0GuWfgJy

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks