General

  • Target

    e21fa7a176c1e58d2d090a0d8817434f2714f8c72c0ba1815eb6ac5520713159

  • Size

    332KB

  • Sample

    221102-y6w1xsbeg6

  • MD5

    a3cb8ef7fb9f70e11d3b90f45f701ae8

  • SHA1

    e4029b8d4bf0ae0bfdf974e6d7395dca5e62b16f

  • SHA256

    e21fa7a176c1e58d2d090a0d8817434f2714f8c72c0ba1815eb6ac5520713159

  • SHA512

    a1fad7349d3622328b0ac73e17ab6685df2269fd2c244814ddc454d94f6c269e990ff71f70f6ffd22c3ff25a8b100a953338de5552774ac38a23d3b64e2da4b8

  • SSDEEP

    6144:hLqGg2LwBOmC3YORXex1QLd1N/QWOW7ITsq:RqL2WxsY+eQ5P7

Malware Config

Extracted

Family

redline

Botnet

Google2

C2

167.235.71.14:20469

Attributes
  • auth_value

    fb274d9691235ba015830da570a13578

Extracted

Family

redline

Botnet

rat

C2

77.73.134.48:21674

Attributes
  • auth_value

    1ae934c4e828a925cb34024f5ccc624f

Targets

    • Target

      e21fa7a176c1e58d2d090a0d8817434f2714f8c72c0ba1815eb6ac5520713159

    • Size

      332KB

    • MD5

      a3cb8ef7fb9f70e11d3b90f45f701ae8

    • SHA1

      e4029b8d4bf0ae0bfdf974e6d7395dca5e62b16f

    • SHA256

      e21fa7a176c1e58d2d090a0d8817434f2714f8c72c0ba1815eb6ac5520713159

    • SHA512

      a1fad7349d3622328b0ac73e17ab6685df2269fd2c244814ddc454d94f6c269e990ff71f70f6ffd22c3ff25a8b100a953338de5552774ac38a23d3b64e2da4b8

    • SSDEEP

      6144:hLqGg2LwBOmC3YORXex1QLd1N/QWOW7ITsq:RqL2WxsY+eQ5P7

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Detect Amadey credential stealer module

    • Detects Smokeloader packer

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks