General

  • Target

    dd35ac19336b6578c4c2c03d65e36a1eca0bf9e2e64d0d148c1e658e63c8ab21

  • Size

    217KB

  • Sample

    221017-1hpytadehm

  • MD5

    d410a31fec5417accd324ac491abfb69

  • SHA1

    af05cebba570896cd9ffb651572ed55b94cfcd75

  • SHA256

    dd35ac19336b6578c4c2c03d65e36a1eca0bf9e2e64d0d148c1e658e63c8ab21

  • SHA512

    c044ad178c73b92efd2d0e86363d6ef029c1712af8dacd12180d2ed28d75e9d43a6fcf4e85cd1249e3936f8918c049707756a3df1f9a968288a0e77372f12058

  • SSDEEP

    3072:KYA3wHwEJmQZX3S1G4LzaRHBv6UiPCFCHjnGAg+vRazYOE/mGua1n8Y:KL3wT5XipLzaVBv6rGtPEZJ1n8

Malware Config

Extracted

Family

redline

C2

45.15.156.37:110

Attributes
  • auth_value

    5b663effac3b92fe687f0181631eeff2

Extracted

Family

allcome

C2

http://dba692117be7b6d3480fe5220fdd58b38bf.xyz/API/2/configure.php?cf6zrlhn=eblon

Wallets

DUQm48oydKgNwdYn4PzPZYxY9smehcHVjB

rGzqdqBk9a5BGhC4JWBSmwQiBy8zdnR7Tn

0x379844563B2947bCf8Ee7660d674E91704ba85cc

Xuz8aqGG2mBWXt4gDRMDkSseFKKe6zziyi

TNCZ8Qu1GQqV5Fi6iZBdiHXMxVu1LYFqQX

t1LyGvKhU1Gc14vvoR1fugvb5D3ueGdKkvz

GAHOFB2SVCUHKTB6F5L7GGDHAK7JLJJL73B6NBTB4WFB2GDDJZIDJDCX

46udGK3EgNQKESwPaYA8EQNLkxMhYZChhGxGJDtL112b15yVDPUiitoDZ6J152778r87B8HYaoWZzgdE32Fo4V8ZBDtnYjh

qpmxvq0yc6vzh8p24ytkck4zwyeuwpxmnvy9m48hvv

bc1qr8qp3yvj5t46tx2c0h3rt2g2jzunwafr2h6wwf

0x81B94C343661fbE735d2560c8190241f9958e94d

Lega1BRXbYREKUP64MxdWZXF8XkaT4R79f

ronin:41e9c027a808f6c59579a67e1a9a898c2ad1206a

+79889916188

+79889916188

+79889916188

P1074987499

Lega1BRXbYREKUP64MxdWZXF8XkaT4R79f

ltc1qpu9glf7q3d05dknexcl7alw6y8k3rcelmteu24

bc1qr8qp3yvj5t46tx2c0h3rt2g2jzunwafr2h6wwf

Targets

    • Target

      dd35ac19336b6578c4c2c03d65e36a1eca0bf9e2e64d0d148c1e658e63c8ab21

    • Size

      217KB

    • MD5

      d410a31fec5417accd324ac491abfb69

    • SHA1

      af05cebba570896cd9ffb651572ed55b94cfcd75

    • SHA256

      dd35ac19336b6578c4c2c03d65e36a1eca0bf9e2e64d0d148c1e658e63c8ab21

    • SHA512

      c044ad178c73b92efd2d0e86363d6ef029c1712af8dacd12180d2ed28d75e9d43a6fcf4e85cd1249e3936f8918c049707756a3df1f9a968288a0e77372f12058

    • SSDEEP

      3072:KYA3wHwEJmQZX3S1G4LzaRHBv6UiPCFCHjnGAg+vRazYOE/mGua1n8Y:KL3wT5XipLzaVBv6rGtPEZJ1n8

    • Allcome

      A clipbanker that supports stealing different cryptocurrency wallets and payment forms.

    • Detects Smokeloader packer

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks