Resubmissions

17/10/2022, 15:19

221017-sqn3gscbh3 10

16/10/2022, 11:07

221016-m7zbwshdd5 10

General

  • Target

    49ce053c9dea98eb0de0d87fd09c39c6.exe

  • Size

    2.6MB

  • Sample

    221016-m7zbwshdd5

  • MD5

    49ce053c9dea98eb0de0d87fd09c39c6

  • SHA1

    963cd86e9c32f38c6846ee9bfb3ff741b91b1d17

  • SHA256

    ee2f4e019c67ac698cd6070a2a10c4b634bccc69147c2fa8c38984835f7ffa5c

  • SHA512

    6e80cd25cf0f8e64c8aad7f2e090c4119a938cdf4cc70ff72ad898bc6dad482e79b06500ed6364b2eebd8089f8a4cdfb773f24bd482e51fe0b4b00546e0209f3

  • SSDEEP

    49152:P3xHty7PwuQ8qZWtzx5ap59pTfNUIDoaIl3M:P3xHty7PlqgzSD9UIDo8

Malware Config

Extracted

Family

redline

Botnet

@EBANIYNOYNAME

C2

82.115.223.48:26393

Attributes
  • auth_value

    3517499b9df589c8c64f775931cb7b6d

Targets

    • Target

      49ce053c9dea98eb0de0d87fd09c39c6.exe

    • Size

      2.6MB

    • MD5

      49ce053c9dea98eb0de0d87fd09c39c6

    • SHA1

      963cd86e9c32f38c6846ee9bfb3ff741b91b1d17

    • SHA256

      ee2f4e019c67ac698cd6070a2a10c4b634bccc69147c2fa8c38984835f7ffa5c

    • SHA512

      6e80cd25cf0f8e64c8aad7f2e090c4119a938cdf4cc70ff72ad898bc6dad482e79b06500ed6364b2eebd8089f8a4cdfb773f24bd482e51fe0b4b00546e0209f3

    • SSDEEP

      49152:P3xHty7PwuQ8qZWtzx5ap59pTfNUIDoaIl3M:P3xHty7PlqgzSD9UIDo8

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks