General

  • Target

    1424887a14e1bbf4c1c1ea1aaea4e71661c51ed417678972ac4ed5f6a3c66ae5

  • Size

    203KB

  • Sample

    221018-2lcy4aeefn

  • MD5

    2590b1017ea0cf9d56165badf7d6fc60

  • SHA1

    271031955c8c734e14f8f7df8c386123ab56f731

  • SHA256

    1424887a14e1bbf4c1c1ea1aaea4e71661c51ed417678972ac4ed5f6a3c66ae5

  • SHA512

    fcf87a9beeefd987e107046ac6cb01f28eba74c6426cb48678e5e2ebb209da23677f97ca87d2abbf46034b62e166eec6418f2e1209ee373f32ce16ab3c27b9b4

  • SSDEEP

    3072:bXOrdKLhzhiEpPXs5u7UGKEV5Bc13vb+LwZ9EE0KWFyUmKUuS:zadKLh9dFUaVkN+Uz0jyuS

Malware Config

Extracted

Family

redline

C2

45.15.156.37:110

Attributes
  • auth_value

    5b663effac3b92fe687f0181631eeff2

Targets

    • Target

      1424887a14e1bbf4c1c1ea1aaea4e71661c51ed417678972ac4ed5f6a3c66ae5

    • Size

      203KB

    • MD5

      2590b1017ea0cf9d56165badf7d6fc60

    • SHA1

      271031955c8c734e14f8f7df8c386123ab56f731

    • SHA256

      1424887a14e1bbf4c1c1ea1aaea4e71661c51ed417678972ac4ed5f6a3c66ae5

    • SHA512

      fcf87a9beeefd987e107046ac6cb01f28eba74c6426cb48678e5e2ebb209da23677f97ca87d2abbf46034b62e166eec6418f2e1209ee373f32ce16ab3c27b9b4

    • SSDEEP

      3072:bXOrdKLhzhiEpPXs5u7UGKEV5Bc13vb+LwZ9EE0KWFyUmKUuS:zadKLh9dFUaVkN+Uz0jyuS

    • Detects Smokeloader packer

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks