General

  • Target

    8cdbfa30b86f34fb01e03870471ab66f4cf800086278daa3a0df94179ada3bfb

  • Size

    231KB

  • Sample

    221226-jq3ffafg41

  • MD5

    b4ce27974da93fd1cbb25d6c801bcc68

  • SHA1

    e3ab007ca97791e74c954725d3620e98f0f150bf

  • SHA256

    8cdbfa30b86f34fb01e03870471ab66f4cf800086278daa3a0df94179ada3bfb

  • SHA512

    7346310dd8cd173d86b24f8497dc80b85ff15d1796ed35abfeb8ba74ea9cae5ac3275ca6eb18bc7de58ba6d3b0c290b7d88847daa0596fc79155a0e3e1844e91

  • SSDEEP

    3072:0HXaL795R0oOdA9DLm+QlS1g/tK8MytgaLrcSb54VIcVTuh:nL7Bbh9D63tK8JbIr

Malware Config

Extracted

Family

redline

Botnet

11

C2

79.137.202.18:45218

Attributes
  • auth_value

    107e09eee63158d2488feb03dac75204

Targets

    • Target

      8cdbfa30b86f34fb01e03870471ab66f4cf800086278daa3a0df94179ada3bfb

    • Size

      231KB

    • MD5

      b4ce27974da93fd1cbb25d6c801bcc68

    • SHA1

      e3ab007ca97791e74c954725d3620e98f0f150bf

    • SHA256

      8cdbfa30b86f34fb01e03870471ab66f4cf800086278daa3a0df94179ada3bfb

    • SHA512

      7346310dd8cd173d86b24f8497dc80b85ff15d1796ed35abfeb8ba74ea9cae5ac3275ca6eb18bc7de58ba6d3b0c290b7d88847daa0596fc79155a0e3e1844e91

    • SSDEEP

      3072:0HXaL795R0oOdA9DLm+QlS1g/tK8MytgaLrcSb54VIcVTuh:nL7Bbh9D63tK8JbIr

    • Detects Smokeloader packer

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks