General

  • Target

    a0be29370f072a873823b78aa7117cebb78e57130961a997ddebe706b257e20c

  • Size

    139KB

  • Sample

    221225-x6al9aca36

  • MD5

    89106ba1671c979f17aacda9d3113446

  • SHA1

    03e9593d12b9159e51044c3bcae3aa0f794023a8

  • SHA256

    e3500e4d0e7c9d3f1e2eec7e8053276692a40275e0513297eb0958c1a0078189

  • SHA512

    16972a9c321b3d56cce473d9be5705e485f1a05176f799c660523405d4866e28956867ac180c4a823272a1ba603dc8f59f45ebf36a31153d4f5b975b3989bc6d

  • SSDEEP

    3072:2GeTauLT5Emhjd9TliMZlpGCHjJKnIrVSRBE:2nWmhh9Tl3lwCHjwJRBE

Malware Config

Extracted

Family

redline

Botnet

11

C2

79.137.202.18:45218

Attributes
  • auth_value

    107e09eee63158d2488feb03dac75204

Targets

    • Target

      a0be29370f072a873823b78aa7117cebb78e57130961a997ddebe706b257e20c

    • Size

      221KB

    • MD5

      bc0d313f0f73841b3a9300b8bcfc1879

    • SHA1

      254cdca71d065b1fc0bbaed30de12b0ba57f6c06

    • SHA256

      a0be29370f072a873823b78aa7117cebb78e57130961a997ddebe706b257e20c

    • SHA512

      3f7f2769ff8c26f62567107346db30cc207adc946f3c0f5733c8753cbfaad60657cd99d6ccf97e2db7c0f2345eb8f08880fc0ebc5bc81d3c2a0c1d248c195ef3

    • SSDEEP

      3072:zB7OaLYXRgK7w5eBtJpW0Qa7Ksm0fBfzKm4FiPjR2tJ/aA4yCw7RkxmJZs:9LERg0VBQTa1RmeR4J/aAzCGymI

    • Detects Smokeloader packer

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks