General

  • Target

    69edc6ac8ec6560de132ec0d7243abcdd3734fc6ea94026aa027096c64f1c819

  • Size

    319KB

  • Sample

    221101-tzmrfsecfk

  • MD5

    10ede4cd981030348cd6ba5fe1903a6b

  • SHA1

    6068ff7ec1ae97c1b1b19b8c81fdd191102d365c

  • SHA256

    69edc6ac8ec6560de132ec0d7243abcdd3734fc6ea94026aa027096c64f1c819

  • SHA512

    e34eaa5dba3077f45b54264a2e2f6196ba0d425c39db6db0fc3f994a326499933c16558caf6d8f02d9654eb411988b1884e1def95a40f35c8fcbc522201771ef

  • SSDEEP

    6144:UVZG84i8N5wZ55DQ7xGC5Q/vXe27ITsqe:UVZG+05o55MxK//7

Malware Config

Extracted

Family

redline

Botnet

Google2

C2

167.235.71.14:20469

Attributes
  • auth_value

    fb274d9691235ba015830da570a13578

Targets

    • Target

      69edc6ac8ec6560de132ec0d7243abcdd3734fc6ea94026aa027096c64f1c819

    • Size

      319KB

    • MD5

      10ede4cd981030348cd6ba5fe1903a6b

    • SHA1

      6068ff7ec1ae97c1b1b19b8c81fdd191102d365c

    • SHA256

      69edc6ac8ec6560de132ec0d7243abcdd3734fc6ea94026aa027096c64f1c819

    • SHA512

      e34eaa5dba3077f45b54264a2e2f6196ba0d425c39db6db0fc3f994a326499933c16558caf6d8f02d9654eb411988b1884e1def95a40f35c8fcbc522201771ef

    • SSDEEP

      6144:UVZG84i8N5wZ55DQ7xGC5Q/vXe27ITsqe:UVZG+05o55MxK//7

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Amadey credential stealer module

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks