Resubmissions

17/10/2022, 13:17

221017-qjdbascagm 10

17/10/2022, 06:14

221017-gzbmzaagg3 10

General

  • Target

    MetaLauncher.rar

  • Size

    3.7MB

  • Sample

    221017-gzbmzaagg3

  • MD5

    2a7451848b83d8cee233c4f844c87378

  • SHA1

    d65830ed2c2d6b7b4e5feb63d51eae663c4eaa3a

  • SHA256

    a0ed1b03299900a0b14059932808da30caccab6f3a6f5286a581b524034d84a7

  • SHA512

    fb897e68df2cf041d476773096b83e1f92d1f74c3c3bcc6603723e0b750815be50bdf48c6f5bbb9a49c66224f71c1ac9cb419ebce7ee2bb39e4b6d338c2b2701

  • SSDEEP

    98304:pFCR+8mcobnXbnCK7HgjpgoZq10CmAoRgbMvFF8:pR8m5bnXbnCmgtLZqOCayM9F8

Malware Config

Extracted

Family

redline

Botnet

idiot

C2

185.106.93.212:5616

Attributes
  • auth_value

    a2648a76c8df40c3df6d8e561e3fd09c

Targets

    • Target

      MetaLauncher.exe

    • Size

      700.0MB

    • MD5

      ef0252c71127e6aecb0dce4026ec5b12

    • SHA1

      fa59f410e3e3fc3508b0be90e25f5276f4e935bd

    • SHA256

      2b74c16506089e7b924665f6b6995daec9304ee9faf8d32a149fe5eb4799cbcc

    • SHA512

      e37abc995ec518fb436b0441667151a81afc2885e0eedbd579c84a3dbf42cfe7fd6ed0d20e29636798dfd605d182931eb35214d7d384d9bfdba3010a5a73ed53

    • SSDEEP

      49152:2PVuj3MxjxmxDfsAe2/0OsueEu6FREcK1ZEFcF5jAvJhg2jn5HNisTiiSbKvTnVB:2PVuQxxmxW2sjueT1GwoJe4yFu

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks