General

  • Target

    C4Setup.exe

  • Size

    108KB

  • Sample

    221102-yc2z3sdghp

  • MD5

    3e786cc85a15e90d095d696f4a794106

  • SHA1

    f5d58d2e442ec63afd40fb69f56c1fbf6c8fa571

  • SHA256

    909f65c1e21ac80b54a779188e04a56585d3927d7e7c12941401bcc341968c3c

  • SHA512

    98961bf70b47a177c1b9ff7bafcba9764d8979fa6e5d12488c1822a20cc2f1d0edbde230c97ef430020f75e3c7bb0e945428f8403e8316016bd4ba2b3d777432

  • SSDEEP

    3072:MO0/I+9JPhalWf8tcp2tUrPutolvt2NG/Ic:Mnf0lW5N2NG/Ic

Malware Config

Extracted

Family

redline

Botnet

1

C2

107.182.129.73:21733

Attributes
  • auth_value

    3a5bb0917495b4312d052a0b8977d2bb

Targets

    • Target

      C4Setup.exe

    • Size

      108KB

    • MD5

      3e786cc85a15e90d095d696f4a794106

    • SHA1

      f5d58d2e442ec63afd40fb69f56c1fbf6c8fa571

    • SHA256

      909f65c1e21ac80b54a779188e04a56585d3927d7e7c12941401bcc341968c3c

    • SHA512

      98961bf70b47a177c1b9ff7bafcba9764d8979fa6e5d12488c1822a20cc2f1d0edbde230c97ef430020f75e3c7bb0e945428f8403e8316016bd4ba2b3d777432

    • SSDEEP

      3072:MO0/I+9JPhalWf8tcp2tUrPutolvt2NG/Ic:Mnf0lW5N2NG/Ic

    • Modifies security service

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Stops running service(s)

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Persistence

Modify Existing Service

2
T1031

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Impair Defenses

1
T1562

Scripting

1
T1064

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Impact

Service Stop

1
T1489

Tasks