General

  • Target

    911b63666e56a18d89013f96ea1e3bf3b0a7d8e5b153f.exe

  • Size

    286KB

  • Sample

    221105-vw1pksbagp

  • MD5

    344ae70f0027932c5f5b72bd0cab63ef

  • SHA1

    21456605f853367fabc573190a6599273104c8e5

  • SHA256

    911b63666e56a18d89013f96ea1e3bf3b0a7d8e5b153f5ce733dada7abbf7c86

  • SHA512

    e5212436cc7f697b547980c6d8d54876b102591773151ef97336543e2787f09c2f1686fe284f0193ccb950e515553d9540f3317ce20c0db4a9a85917b0116032

  • SSDEEP

    3072:eLquc0aggYLf5qcTrDzsKuUq08xWrfG0b+/GryXxnUs:Wq8GYk4xpq08xWa0a//hUs

Malware Config

Extracted

Family

redline

Botnet

Google2

C2

167.235.71.14:20469

Attributes
  • auth_value

    fb274d9691235ba015830da570a13578

Extracted

Family

redline

C2

45.15.156.52:45

Attributes
  • auth_value

    19cd76dae6d01d9649fd29624fa61e51

Extracted

Family

redline

Botnet

@REDLINEVIP Cloud (TG: @FATHEROFCARDERS)

C2

151.80.89.233:13553

Attributes
  • auth_value

    fbee175162920530e6bf470c8003fa1a

Extracted

Family

redline

Botnet

1.0.1

C2

148.163.81.19:38619

Attributes
  • auth_value

    590d569fc729419091688ae460e2ae4d

Targets

    • Target

      911b63666e56a18d89013f96ea1e3bf3b0a7d8e5b153f.exe

    • Size

      286KB

    • MD5

      344ae70f0027932c5f5b72bd0cab63ef

    • SHA1

      21456605f853367fabc573190a6599273104c8e5

    • SHA256

      911b63666e56a18d89013f96ea1e3bf3b0a7d8e5b153f5ce733dada7abbf7c86

    • SHA512

      e5212436cc7f697b547980c6d8d54876b102591773151ef97336543e2787f09c2f1686fe284f0193ccb950e515553d9540f3317ce20c0db4a9a85917b0116032

    • SSDEEP

      3072:eLquc0aggYLf5qcTrDzsKuUq08xWrfG0b+/GryXxnUs:Wq8GYk4xpq08xWa0a//hUs

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Amadey credential stealer module

    • Detects Smokeloader packer

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks