General

  • Target

    9c0f1ccdeeca7012745a6bac388444555001654b2e294a4cb0e66f62f41192e1

  • Size

    340KB

  • Sample

    221102-a3721sgbg9

  • MD5

    258b594d256e8698142efe18067b9dc8

  • SHA1

    7b0cf847003712b9b95131063d6c7102c136ed61

  • SHA256

    9c0f1ccdeeca7012745a6bac388444555001654b2e294a4cb0e66f62f41192e1

  • SHA512

    521e91828ed5462f40dabb7e9858e8912575cb2183f57b31c9acd57ed2e95fc26d517c092cc0c44cb837d1175a5b3c9bc0617becb57f301797ac8a949008ee30

  • SSDEEP

    6144:k4nqu9/sfOVv1sukMPL3tcXdr33DS6fqiP7ITsq:k4nL/s23sxyKtrHDpqiP7

Malware Config

Extracted

Family

redline

Botnet

Google2

C2

167.235.71.14:20469

Attributes
  • auth_value

    fb274d9691235ba015830da570a13578

Targets

    • Target

      9c0f1ccdeeca7012745a6bac388444555001654b2e294a4cb0e66f62f41192e1

    • Size

      340KB

    • MD5

      258b594d256e8698142efe18067b9dc8

    • SHA1

      7b0cf847003712b9b95131063d6c7102c136ed61

    • SHA256

      9c0f1ccdeeca7012745a6bac388444555001654b2e294a4cb0e66f62f41192e1

    • SHA512

      521e91828ed5462f40dabb7e9858e8912575cb2183f57b31c9acd57ed2e95fc26d517c092cc0c44cb837d1175a5b3c9bc0617becb57f301797ac8a949008ee30

    • SSDEEP

      6144:k4nqu9/sfOVv1sukMPL3tcXdr33DS6fqiP7ITsq:k4nL/s23sxyKtrHDpqiP7

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Detect Amadey credential stealer module

    • Detects Smokeloader packer

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks