General

  • Target

    file.exe

  • Size

    239KB

  • Sample

    221014-rcplesdfcq

  • MD5

    4c6f21e21d11d8192c3ee91634253f25

  • SHA1

    f92883ad268229de289063f85e695a557a0b9f04

  • SHA256

    ff61d680efc0206c1e90570dd0ec53a0d69eb4a2a7c7e1239d4d38a0541e6646

  • SHA512

    7c20866d170b9b1e7651a4b79daea002935aa8cc10701247b1ffd6adba8b142cae6c2c26cde3883cc0e8f6a0abeb1f1f41c01e8f7dc657c187f67f6a3943ffb6

  • SSDEEP

    3072:NJ5GfABjzBzxKtfIqJIVY2KKEUVsy+vZpMf0EiGOG6/4h1Y/+:NznBjzNxWtWVY2pEUVT+vZpAzy+

Malware Config

Extracted

Family

redline

Botnet

Lyla5.09.10

C2

185.215.113.216:21921

Attributes
  • auth_value

    f4cb3c95f7f660ec19bf1f8dd48c3b24

Extracted

Family

vidar

Version

55

Botnet

1680

C2

https://t.me/truewallets

https://mas.to/@zara99

http://116.203.10.3:80

Attributes
  • profile_id

    1680

Targets

    • Target

      file.exe

    • Size

      239KB

    • MD5

      4c6f21e21d11d8192c3ee91634253f25

    • SHA1

      f92883ad268229de289063f85e695a557a0b9f04

    • SHA256

      ff61d680efc0206c1e90570dd0ec53a0d69eb4a2a7c7e1239d4d38a0541e6646

    • SHA512

      7c20866d170b9b1e7651a4b79daea002935aa8cc10701247b1ffd6adba8b142cae6c2c26cde3883cc0e8f6a0abeb1f1f41c01e8f7dc657c187f67f6a3943ffb6

    • SSDEEP

      3072:NJ5GfABjzBzxKtfIqJIVY2KKEUVsy+vZpMf0EiGOG6/4h1Y/+:NznBjzNxWtWVY2pEUVT+vZpAzy+

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Detectes Phoenix Miner Payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

3
T1005

Command and Control

Web Service

1
T1102

Tasks