General

  • Target

    e37c70de7109c60775583070679ce35692abdc90376fb25ed6b5b5d1bcd67642

  • Size

    172KB

  • Sample

    221113-sacphsee9y

  • MD5

    e3bdde577faaa39423bfb4002709c477

  • SHA1

    e82e30756d17237700a234efbc7bb316c3c70e06

  • SHA256

    e37c70de7109c60775583070679ce35692abdc90376fb25ed6b5b5d1bcd67642

  • SHA512

    607de8047a30f72511a322e4fd20d57ed800334209248a4fc253288260724036a266a582c81971a312ee3515d98d8d7971b0f5d4efb1688a7a106ead8b5f79b9

  • SSDEEP

    3072:fTSBZEfr2LXhbt4p4/xR8YoUckSMOJtWMZJwg6fdt:fu7jLXhbt4pc8xdPhyMZ+d

Malware Config

Extracted

Family

redline

Botnet

123

C2

78.153.144.3:2510

Attributes
  • auth_value

    cd6abb0af211bce081d7bf127cc26835

Extracted

Family

redline

Botnet

Google2

C2

167.235.71.14:20469

Attributes
  • auth_value

    fb274d9691235ba015830da570a13578

Targets

    • Target

      e37c70de7109c60775583070679ce35692abdc90376fb25ed6b5b5d1bcd67642

    • Size

      172KB

    • MD5

      e3bdde577faaa39423bfb4002709c477

    • SHA1

      e82e30756d17237700a234efbc7bb316c3c70e06

    • SHA256

      e37c70de7109c60775583070679ce35692abdc90376fb25ed6b5b5d1bcd67642

    • SHA512

      607de8047a30f72511a322e4fd20d57ed800334209248a4fc253288260724036a266a582c81971a312ee3515d98d8d7971b0f5d4efb1688a7a106ead8b5f79b9

    • SSDEEP

      3072:fTSBZEfr2LXhbt4p4/xR8YoUckSMOJtWMZJwg6fdt:fu7jLXhbt4pc8xdPhyMZ+d

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Possible privilege escalation attempt

    • Stops running service(s)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Impair Defenses

1
T1562

File Permissions Modification

1
T1222

Scripting

1
T1064

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

5
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

5
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Impact

Service Stop

1
T1489

Tasks