General

  • Target

    5443ef1eebc8e02cc45cbf70a8cf508a9dad9a535f1223176e456bdef831e2b3

  • Size

    308KB

  • Sample

    221229-3115xahg51

  • MD5

    9b3eb93a4e838fbe5fd5c1c2108d0895

  • SHA1

    642d2f98549277cabdcb4c06de20b9dbead98fef

  • SHA256

    5443ef1eebc8e02cc45cbf70a8cf508a9dad9a535f1223176e456bdef831e2b3

  • SHA512

    f8d7999613123f6271999ac888ca18d9126809c9b5780b09b9345344e30aff8a1aa74fabcf1766a0e4a972501d769ed9669c9fd21e1c8a10e392b2757e30097a

  • SSDEEP

    6144:YL2QXBjFo9GjZmXJGRbYrByIxZ1WqqdSv9x:YSQXVFo9U8ARbmdYU

Malware Config

Extracted

Family

redline

Botnet

installs

C2

77.73.134.57:20368

Attributes
  • auth_value

    018d84fd84774560e4827f12acc7d4af

Targets

    • Target

      5443ef1eebc8e02cc45cbf70a8cf508a9dad9a535f1223176e456bdef831e2b3

    • Size

      308KB

    • MD5

      9b3eb93a4e838fbe5fd5c1c2108d0895

    • SHA1

      642d2f98549277cabdcb4c06de20b9dbead98fef

    • SHA256

      5443ef1eebc8e02cc45cbf70a8cf508a9dad9a535f1223176e456bdef831e2b3

    • SHA512

      f8d7999613123f6271999ac888ca18d9126809c9b5780b09b9345344e30aff8a1aa74fabcf1766a0e4a972501d769ed9669c9fd21e1c8a10e392b2757e30097a

    • SSDEEP

      6144:YL2QXBjFo9GjZmXJGRbYrByIxZ1WqqdSv9x:YSQXVFo9U8ARbmdYU

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Detects Smokeloader packer

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks