General

  • Target

    51dcab7d0fcc6a5205a003c0f8e4664fa6cfe3fc497e5baed8669c32b258b473

  • Size

    225KB

  • Sample

    221022-wpjyxseca9

  • MD5

    7667e8967387863076e5e34bceceda12

  • SHA1

    93f4d0c73fca84b2e13478ee009c9a6d70dba3ca

  • SHA256

    51dcab7d0fcc6a5205a003c0f8e4664fa6cfe3fc497e5baed8669c32b258b473

  • SHA512

    421a2a04ca706e55429bc08a7dbaeaf8c45923e1df3cfa35b68f2290cb0107b10c625275b3717618562d7028f50f3787a66d37ed20feb3dea5893a18d2bd9782

  • SSDEEP

    3072:YXqAWLDqEuTUA5OcgcOXV3Db5xqHP/Z6Dkg5A7TMQggOHXlH3K2:s3WLRi+CidaHP/ZGkn/MQgD3n

Malware Config

Extracted

Family

redline

Botnet

nam7

C2

103.89.90.61:34589

Attributes
  • auth_value

    533c8fbdab4382453812c73ea2cee5b8

Extracted

Family

redline

Botnet

Google2

C2

167.235.71.14:20469

Attributes
  • auth_value

    fb274d9691235ba015830da570a13578

Extracted

Family

redline

Botnet

slovarikinstalls

C2

78.153.144.3:2510

Attributes
  • auth_value

    5f80b2ec82e3bd02a08a3a55d3180551

Extracted

Family

redline

Botnet

Newe

C2

89.208.106.66:4691

Attributes
  • auth_value

    e7141b98243e53ec71dadf6344aff038

Targets

    • Target

      51dcab7d0fcc6a5205a003c0f8e4664fa6cfe3fc497e5baed8669c32b258b473

    • Size

      225KB

    • MD5

      7667e8967387863076e5e34bceceda12

    • SHA1

      93f4d0c73fca84b2e13478ee009c9a6d70dba3ca

    • SHA256

      51dcab7d0fcc6a5205a003c0f8e4664fa6cfe3fc497e5baed8669c32b258b473

    • SHA512

      421a2a04ca706e55429bc08a7dbaeaf8c45923e1df3cfa35b68f2290cb0107b10c625275b3717618562d7028f50f3787a66d37ed20feb3dea5893a18d2bd9782

    • SSDEEP

      3072:YXqAWLDqEuTUA5OcgcOXV3Db5xqHP/Z6Dkg5A7TMQggOHXlH3K2:s3WLRi+CidaHP/ZGkn/MQgD3n

    • Detects Smokeloader packer

    • Modifies security service

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Stops running service(s)

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Persistence

Modify Existing Service

2
T1031

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

2
T1112

Impair Defenses

1
T1562

Scripting

1
T1064

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Impact

Service Stop

1
T1489

Tasks