General

  • Target

    e27ac6756cbebfb6679f7f6b8428aa24efca10a089aaf582f14b3b07ef1d044b

  • Size

    7.1MB

  • Sample

    221206-ez4yeahd78

  • MD5

    51dae8d6208cc255aea7ad0eaba77014

  • SHA1

    dd949ae42f7bc491ac29d9d68b8d12379270bb1a

  • SHA256

    e27ac6756cbebfb6679f7f6b8428aa24efca10a089aaf582f14b3b07ef1d044b

  • SHA512

    c3ab44e3e69e8baee8f215ab2297cab20d2fb9a56e375ae86e8e1102f7d43f683cee64bcd3bfcf59d60742bab80b371de3b18fd5519414787d1cf4eb2e992ed5

  • SSDEEP

    196608:F7nmjqCE8cpmmTVPuF2O8ET7pbO0yA7GO:F7nYRE8cQmTVP2vnl7L

Malware Config

Extracted

Family

systembc

C2

89.22.236.225:4193

176.124.205.5:4193

Extracted

Family

vidar

Version

56.1

Botnet

1569

C2

https://t.me/dishasta

https://steamcommunity.com/profiles/76561199441933804

Attributes
  • profile_id

    1569

Targets

    • Target

      e27ac6756cbebfb6679f7f6b8428aa24efca10a089aaf582f14b3b07ef1d044b

    • Size

      7.1MB

    • MD5

      51dae8d6208cc255aea7ad0eaba77014

    • SHA1

      dd949ae42f7bc491ac29d9d68b8d12379270bb1a

    • SHA256

      e27ac6756cbebfb6679f7f6b8428aa24efca10a089aaf582f14b3b07ef1d044b

    • SHA512

      c3ab44e3e69e8baee8f215ab2297cab20d2fb9a56e375ae86e8e1102f7d43f683cee64bcd3bfcf59d60742bab80b371de3b18fd5519414787d1cf4eb2e992ed5

    • SSDEEP

      196608:F7nmjqCE8cpmmTVPuF2O8ET7pbO0yA7GO:F7nYRE8cQmTVP2vnl7L

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • SystemBC

      SystemBC is a proxy and remote administration tool first seen in 2019.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

2
T1081

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Remote System Discovery

1
T1018

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Tasks