General

  • Target

    5591cb7023f036ae4b5390ded912b452b4f4d84c719c41c4b3c205559d42f81c

  • Size

    231KB

  • Sample

    221014-vm4d4sdhdm

  • MD5

    6e6be82f39f27930378f95109437612f

  • SHA1

    5ff346f074c367ae5e982fdca0d76b15c588544a

  • SHA256

    5591cb7023f036ae4b5390ded912b452b4f4d84c719c41c4b3c205559d42f81c

  • SHA512

    bac9c357ab7ef593f7087ef47a79a6e5f2ea2fdc4c2200b1db1d1c20b8ed530445250bd563105d07adbc98395af5411496ed8e58bbe0828b0301ef43b839a050

  • SSDEEP

    6144:CINrtwmE1C8OLuyUPQnyAU4T02uryASii:CIfE1aLmoSzJS

Malware Config

Extracted

Family

redline

C2

45.15.156.37:110

Attributes
  • auth_value

    5b663effac3b92fe687f0181631eeff2

Targets

    • Target

      5591cb7023f036ae4b5390ded912b452b4f4d84c719c41c4b3c205559d42f81c

    • Size

      231KB

    • MD5

      6e6be82f39f27930378f95109437612f

    • SHA1

      5ff346f074c367ae5e982fdca0d76b15c588544a

    • SHA256

      5591cb7023f036ae4b5390ded912b452b4f4d84c719c41c4b3c205559d42f81c

    • SHA512

      bac9c357ab7ef593f7087ef47a79a6e5f2ea2fdc4c2200b1db1d1c20b8ed530445250bd563105d07adbc98395af5411496ed8e58bbe0828b0301ef43b839a050

    • SSDEEP

      6144:CINrtwmE1C8OLuyUPQnyAU4T02uryASii:CIfE1aLmoSzJS

    • Detects Smokeloader packer

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks