General

  • Target

    c87dcd21b0dcb51699a4735ac76ad3de.exe

  • Size

    173KB

  • Sample

    221113-v4t7rsfc3s

  • MD5

    c87dcd21b0dcb51699a4735ac76ad3de

  • SHA1

    87d3d0a8aca200fc85ac9646b710141a4098932b

  • SHA256

    b03621290fa3291de14fb80c3f8ca5f35f94c90f662f5f4af53d69e3176e3057

  • SHA512

    bba293557550219edcb37d8fc88d366ff53164e6018beb20f4ecc4f72cc58afae0e8573449602b48a89db916b7643dd9b30d5767c37dcf0d8893cd57f9dfa8e8

  • SSDEEP

    3072:C0lrFhKhmLqTNZZ/DRoz6bisK6XCE/gUumfWTa/7Oj:n7LqTNZF0AisKOVPA

Malware Config

Extracted

Family

redline

Botnet

Google2

C2

167.235.71.14:20469

Attributes
  • auth_value

    fb274d9691235ba015830da570a13578

Targets

    • Target

      c87dcd21b0dcb51699a4735ac76ad3de.exe

    • Size

      173KB

    • MD5

      c87dcd21b0dcb51699a4735ac76ad3de

    • SHA1

      87d3d0a8aca200fc85ac9646b710141a4098932b

    • SHA256

      b03621290fa3291de14fb80c3f8ca5f35f94c90f662f5f4af53d69e3176e3057

    • SHA512

      bba293557550219edcb37d8fc88d366ff53164e6018beb20f4ecc4f72cc58afae0e8573449602b48a89db916b7643dd9b30d5767c37dcf0d8893cd57f9dfa8e8

    • SSDEEP

      3072:C0lrFhKhmLqTNZZ/DRoz6bisK6XCE/gUumfWTa/7Oj:n7LqTNZF0AisKOVPA

    • Detects Smokeloader packer

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Scripting

1
T1064

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Tasks