General

  • Target

    7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d

  • Size

    1.3MB

  • Sample

    221203-aphvzacd3x

  • MD5

    74079c12b9f2aac6e8c6589d02a61bae

  • SHA1

    f3ee1c95814a8bb9f4924219820e84c8b63928b1

  • SHA256

    7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d

  • SHA512

    90a11fd92bab604b2d86a7b0b84b15dc60b68fc8979434930e86e3e7f57eea436ae21f5685ddf8ba9f3f3847ec397340015f32de314f7993e39dcd9b0a7d9e9c

  • SSDEEP

    24576:ZmMuVE/AnaKAHh6akEKtkZf/UUsdAIAtJmzbN9RpMm/fi+oaWuBX/5:ZmMuGJ6nEKqJJxIoJmt97tfi+oa5Bv5

Malware Config

Extracted

Family

systembc

C2

89.22.236.225:4193

176.124.205.5:4193

Targets

    • Target

      7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d

    • Size

      1.3MB

    • MD5

      74079c12b9f2aac6e8c6589d02a61bae

    • SHA1

      f3ee1c95814a8bb9f4924219820e84c8b63928b1

    • SHA256

      7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d

    • SHA512

      90a11fd92bab604b2d86a7b0b84b15dc60b68fc8979434930e86e3e7f57eea436ae21f5685ddf8ba9f3f3847ec397340015f32de314f7993e39dcd9b0a7d9e9c

    • SSDEEP

      24576:ZmMuVE/AnaKAHh6akEKtkZf/UUsdAIAtJmzbN9RpMm/fi+oaWuBX/5:ZmMuGJ6nEKqJJxIoJmt97tfi+oa5Bv5

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • SystemBC

      SystemBC is a proxy and remote administration tool first seen in 2019.

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Remote System Discovery

1
T1018

Collection

Data from Local System

1
T1005

Tasks