General

  • Target

    853860d63c8fe8ed293fc5e3ee087046ec9ae01f0cdc9279422fbaefa82455bb

  • Size

    4.2MB

  • Sample

    221125-17m6hsah57

  • MD5

    80bee79571b9d0d023f231814814ed5c

  • SHA1

    74f91dfcde28ede04a31ac7387119d6d1ae72dcc

  • SHA256

    853860d63c8fe8ed293fc5e3ee087046ec9ae01f0cdc9279422fbaefa82455bb

  • SHA512

    8f66f5fc26a07e93b48324b93df73d35fcedd685ccbb2409a5cb1136eb555afc448aa922be18472ff952443d0b0a095d315ac1d4f2ae2c526154bb2698716ec0

  • SSDEEP

    98304:pHX0g2E6BJH8lFEP6H7bvLupQsbJc+BNrTD5E7vqsD:pHEg2E6fH88MSpQsNc+TrxYvqs

Malware Config

Extracted

Family

redline

Botnet

@rigafox

C2

193.56.146.20:15490

Attributes
  • auth_value

    26aae7097c398fbc9b5d4a08a99ab985

Targets

    • Target

      853860d63c8fe8ed293fc5e3ee087046ec9ae01f0cdc9279422fbaefa82455bb

    • Size

      4.2MB

    • MD5

      80bee79571b9d0d023f231814814ed5c

    • SHA1

      74f91dfcde28ede04a31ac7387119d6d1ae72dcc

    • SHA256

      853860d63c8fe8ed293fc5e3ee087046ec9ae01f0cdc9279422fbaefa82455bb

    • SHA512

      8f66f5fc26a07e93b48324b93df73d35fcedd685ccbb2409a5cb1136eb555afc448aa922be18472ff952443d0b0a095d315ac1d4f2ae2c526154bb2698716ec0

    • SSDEEP

      98304:pHX0g2E6BJH8lFEP6H7bvLupQsbJc+BNrTD5E7vqsD:pHEg2E6fH88MSpQsNc+TrxYvqs

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Modifies Windows Defender Real-time Protection settings

    • Modifies security service

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • UAC bypass

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Persistence

Modify Existing Service

2
T1031

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Bypass User Account Control

1
T1088

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

4
T1112

Disabling Security Tools

2
T1089

Bypass User Account Control

1
T1088

Scripting

1
T1064

Credential Access

Credentials in Files

2
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks