General

  • Target

    ffdf1a73377ea64bdbc70ea81c0a0062.exe

  • Size

    260KB

  • Sample

    221029-fy99gacea4

  • MD5

    ffdf1a73377ea64bdbc70ea81c0a0062

  • SHA1

    79c5021088320eac51daa98976ed5c9ed0f77bab

  • SHA256

    6fb8dd5faf8edb0aac305d8bce322022d7c91897508aeed789d5f0c9c1378304

  • SHA512

    16f97a714166fe9cc41c60fc46c518530fba732122dca6ae3d02e581a1ce6e1201a297332bf074e959546745b610dc615bdf44febcc9517589d49dc072695f45

  • SSDEEP

    3072:4t+kBKHHLhDFkSz5JIIPh9W4UTEQgX0RjI+JQWmWs2oMhibwDM/h3:HkB0HLRFT584Pu1JQWPiI

Malware Config

Extracted

Family

redline

Botnet

slovarik15btc

C2

78.153.144.3:2510

Attributes
  • auth_value

    bfedad55292538ad3edd07ac95ad8952

Extracted

Family

redline

Botnet

Google2

C2

167.235.71.14:20469

Attributes
  • auth_value

    fb274d9691235ba015830da570a13578

Targets

    • Target

      ffdf1a73377ea64bdbc70ea81c0a0062.exe

    • Size

      260KB

    • MD5

      ffdf1a73377ea64bdbc70ea81c0a0062

    • SHA1

      79c5021088320eac51daa98976ed5c9ed0f77bab

    • SHA256

      6fb8dd5faf8edb0aac305d8bce322022d7c91897508aeed789d5f0c9c1378304

    • SHA512

      16f97a714166fe9cc41c60fc46c518530fba732122dca6ae3d02e581a1ce6e1201a297332bf074e959546745b610dc615bdf44febcc9517589d49dc072695f45

    • SSDEEP

      3072:4t+kBKHHLhDFkSz5JIIPh9W4UTEQgX0RjI+JQWmWs2oMhibwDM/h3:HkB0HLRFT584Pu1JQWPiI

    • Detects Smokeloader packer

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks