General

  • Target

    8829d743da16c9d41dd9e5bb74ab0e3a.exe

  • Size

    286KB

  • Sample

    221030-rvrthafcfn

  • MD5

    8829d743da16c9d41dd9e5bb74ab0e3a

  • SHA1

    e53e9e3c8f10b997b9f6e5e870c37c601581d6b5

  • SHA256

    104bce6ba91d4ee1294e1f343e3f583d82888fe8a5e6d3d495174fe398c2a4e0

  • SHA512

    cc9a90021f6035a1d8edc3e4c83da48ddd0e72abf32dabff0e87dfd0539c729f4a6c5f2ba8638fea755a2e4927b4b153b0f2ccac8192ebc3469084690712e179

  • SSDEEP

    3072:upG2U6+UtvFL5TxnKPAd5pQAAWh2lc/2hOcA5V1Smx+M/h3:NUtvFL5TxnKPDAAWh2OcA5V1SA+

Malware Config

Extracted

Family

redline

Botnet

slovarik15btc

C2

78.153.144.3:2510

Attributes
  • auth_value

    bfedad55292538ad3edd07ac95ad8952

Extracted

Family

redline

Botnet

Google2

C2

167.235.71.14:20469

Attributes
  • auth_value

    fb274d9691235ba015830da570a13578

Targets

    • Target

      8829d743da16c9d41dd9e5bb74ab0e3a.exe

    • Size

      286KB

    • MD5

      8829d743da16c9d41dd9e5bb74ab0e3a

    • SHA1

      e53e9e3c8f10b997b9f6e5e870c37c601581d6b5

    • SHA256

      104bce6ba91d4ee1294e1f343e3f583d82888fe8a5e6d3d495174fe398c2a4e0

    • SHA512

      cc9a90021f6035a1d8edc3e4c83da48ddd0e72abf32dabff0e87dfd0539c729f4a6c5f2ba8638fea755a2e4927b4b153b0f2ccac8192ebc3469084690712e179

    • SSDEEP

      3072:upG2U6+UtvFL5TxnKPAd5pQAAWh2lc/2hOcA5V1Smx+M/h3:NUtvFL5TxnKPDAAWh2OcA5V1SA+

    • Detects Smokeloader packer

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks