General

  • Target

    51a69e9ca367afc8f8b3ef8db2a8650f6728ae56ef9db4cee2de88b995ed0f11

  • Size

    223KB

  • Sample

    221224-yxp61sdg21

  • MD5

    230e91d96c730f10db022f04a7f19110

  • SHA1

    5cceb6760fc7f32612cedbbeb8d2fd4c0901c905

  • SHA256

    51a69e9ca367afc8f8b3ef8db2a8650f6728ae56ef9db4cee2de88b995ed0f11

  • SHA512

    53497950915df1e90e48ff26c0ab15e683fa74b30017559db0de3a5e313ce420b1012d0a51b62495711b3e68e42276efaf8237faaff0030e0cdde6bcddc6bcc9

  • SSDEEP

    3072:zDy3aLefDm5jkhafy81oGAK/DcauD3Myf/ln:maLe7tuvQjaM3l

Malware Config

Extracted

Family

redline

Botnet

bundle2

C2

65.21.5.58:24911

Attributes
  • auth_value

    d9f9d4528fe5d7d9b08b5ca49403aef0

Targets

    • Target

      51a69e9ca367afc8f8b3ef8db2a8650f6728ae56ef9db4cee2de88b995ed0f11

    • Size

      223KB

    • MD5

      230e91d96c730f10db022f04a7f19110

    • SHA1

      5cceb6760fc7f32612cedbbeb8d2fd4c0901c905

    • SHA256

      51a69e9ca367afc8f8b3ef8db2a8650f6728ae56ef9db4cee2de88b995ed0f11

    • SHA512

      53497950915df1e90e48ff26c0ab15e683fa74b30017559db0de3a5e313ce420b1012d0a51b62495711b3e68e42276efaf8237faaff0030e0cdde6bcddc6bcc9

    • SSDEEP

      3072:zDy3aLefDm5jkhafy81oGAK/DcauD3Myf/ln:maLe7tuvQjaM3l

    • Detects Smokeloader packer

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks