General

  • Target

    baff04e584c5a8c34b7b9a9a2a621a23227c709d8e5f352e5a24e8522df5a299

  • Size

    152KB

  • Sample

    221113-1swjcagd3y

  • MD5

    e8e6a8ada863676e7c4cf726bf49639a

  • SHA1

    a7608253e5f79f7707f0caaff56cbc00ec08c9aa

  • SHA256

    baff04e584c5a8c34b7b9a9a2a621a23227c709d8e5f352e5a24e8522df5a299

  • SHA512

    a4070610e743398eda79c38e0a4453f5d03647e2223ec1b4a05631258b321dd1c85f1c1b3a24857c83d8c9f67eacf9f2a3dc4ee532450064d3543c641263f22e

  • SSDEEP

    3072:ovDLOGmOQDS5xl55pNSspSz+/YN/dJMXCEes/dRA:0LOGmOQWl5bQ0E+/+/AF/z

Malware Config

Extracted

Family

redline

Botnet

Google2

C2

167.235.71.14:20469

Attributes
  • auth_value

    fb274d9691235ba015830da570a13578

Targets

    • Target

      baff04e584c5a8c34b7b9a9a2a621a23227c709d8e5f352e5a24e8522df5a299

    • Size

      152KB

    • MD5

      e8e6a8ada863676e7c4cf726bf49639a

    • SHA1

      a7608253e5f79f7707f0caaff56cbc00ec08c9aa

    • SHA256

      baff04e584c5a8c34b7b9a9a2a621a23227c709d8e5f352e5a24e8522df5a299

    • SHA512

      a4070610e743398eda79c38e0a4453f5d03647e2223ec1b4a05631258b321dd1c85f1c1b3a24857c83d8c9f67eacf9f2a3dc4ee532450064d3543c641263f22e

    • SSDEEP

      3072:ovDLOGmOQDS5xl55pNSspSz+/YN/dJMXCEes/dRA:0LOGmOQWl5bQ0E+/+/AF/z

    • Detects Smokeloader packer

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Scripting

1
T1064

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Tasks