General

  • Target

    cde39ec933129ccdeeaccab8b5d34ae3.exe

  • Size

    173KB

  • Sample

    221113-xs7ptsff6v

  • MD5

    cde39ec933129ccdeeaccab8b5d34ae3

  • SHA1

    0fffcafeac237e51f062db020d6abb8104737b32

  • SHA256

    94f0e6a5de9925b0bb6d426e6b97373cf8808df6cc62bf3c5b0e4f5c0e667cfd

  • SHA512

    6cdb095269b20a5d64ef0b123dae6ee2e74ded6f8acff4ff587bba91240c29ca0df24e1aaec8cee462301a3aa970480de8fdd6856c50276a00e3bfb2b164c853

  • SSDEEP

    3072:foFRFhf2xLbJVxX/ARlOIiwTLfwflNHdYwF/O0Jco:AALbJVxPYiwXfw9td5O0J1

Malware Config

Extracted

Family

redline

Botnet

Google2

C2

167.235.71.14:20469

Attributes
  • auth_value

    fb274d9691235ba015830da570a13578

Targets

    • Target

      cde39ec933129ccdeeaccab8b5d34ae3.exe

    • Size

      173KB

    • MD5

      cde39ec933129ccdeeaccab8b5d34ae3

    • SHA1

      0fffcafeac237e51f062db020d6abb8104737b32

    • SHA256

      94f0e6a5de9925b0bb6d426e6b97373cf8808df6cc62bf3c5b0e4f5c0e667cfd

    • SHA512

      6cdb095269b20a5d64ef0b123dae6ee2e74ded6f8acff4ff587bba91240c29ca0df24e1aaec8cee462301a3aa970480de8fdd6856c50276a00e3bfb2b164c853

    • SSDEEP

      3072:foFRFhf2xLbJVxX/ARlOIiwTLfwflNHdYwF/O0Jco:AALbJVxPYiwXfw9td5O0J1

    • Detects Smokeloader packer

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Scripting

1
T1064

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Tasks