General

  • Target

    f03cfa30317eefbc658e645242cf7be5a3d012cc26d91f04284b80127d07b6ce

  • Size

    140KB

  • Sample

    221225-v7ld2abh25

  • MD5

    66ed05c260b08f0f8ff255bbf088aeaa

  • SHA1

    4c49ce1dbc0b235771e90dd4eb0caecf4ad294bc

  • SHA256

    58195ded048a529b594c7c15cba762aa6052ac34e074e9b9650461a1df824bbd

  • SHA512

    5fdecfbd83dfebfbb25dec16fdf0559f252f7d46e4a14fc9fa6ba9ff87e74efc8330e6de60ecbf7cae3425c63adc414dc5535d8a124239243d5adf261edd0733

  • SSDEEP

    3072:hkEvx3l6xO3EGFdDgUNS5stO7J0xNdhrWur8gRrlL:WapT3EmdDDNS5+O7wRrNr8SlL

Malware Config

Extracted

Family

redline

Botnet

11

C2

79.137.202.18:45218

Attributes
  • auth_value

    107e09eee63158d2488feb03dac75204

Extracted

Family

aurora

C2

195.43.142.218:8081

Targets

    • Target

      f03cfa30317eefbc658e645242cf7be5a3d012cc26d91f04284b80127d07b6ce

    • Size

      232KB

    • MD5

      612690d2d2a6c5aec8e5b623e2c390cf

    • SHA1

      8f05ab45296839473b91afd9f4ad158f6bd1c2ba

    • SHA256

      f03cfa30317eefbc658e645242cf7be5a3d012cc26d91f04284b80127d07b6ce

    • SHA512

      894691078f834e5038c03ab32d46fee12719af18357c48cdd9b511c196828b9e64d8d10a563aac7693eb024fd968fcb2085af03b9072acf7eb58bb9f0888f88c

    • SSDEEP

      3072:sl8NLawRLUhJ5hX6YMnfaJJZ4s2/nIVzW+5SeAddxZtJ/SRLjw7RkxmJZs:tLFRLk7J/4BEW+ce6dxPJ/SZGymI

    • Aurora

      Aurora is a crypto wallet stealer written in Golang.

    • Detects Smokeloader packer

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Tasks