General

  • Target

    29eec7d98d03a80e5cdb0fe454a1b2b947542551

  • Size

    196KB

  • Sample

    230104-qrvwbabe6y

  • MD5

    42af18e9c5cb26caaaf2377638674a72

  • SHA1

    29eec7d98d03a80e5cdb0fe454a1b2b947542551

  • SHA256

    52063e34a0d7d8c808fcda8cb6675f539aafa2b704a015ecab670ad607d3b359

  • SHA512

    05c9bffc3f730bb3d0c45ff13a1aafbcee485a87711d56b17ba105a50af3f476841d87690bee21ab2165a05de771407b24641d4cacae3434741c5d3ac349bb16

  • SSDEEP

    3072:gFRfNqaAmTNQ0668lu9vQGX8DYIpDq1JrPZsleruOAg0FujDStSB6irks5N3c:qBfTT9H8lCvQPpDq1JrPlAOX6irF5N3c

Malware Config

Extracted

Family

redline

Botnet

1

C2

107.182.129.73:21733

Attributes
  • auth_value

    3a5bb0917495b4312d052a0b8977d2bb

Targets

    • Target

      29eec7d98d03a80e5cdb0fe454a1b2b947542551

    • Size

      196KB

    • MD5

      42af18e9c5cb26caaaf2377638674a72

    • SHA1

      29eec7d98d03a80e5cdb0fe454a1b2b947542551

    • SHA256

      52063e34a0d7d8c808fcda8cb6675f539aafa2b704a015ecab670ad607d3b359

    • SHA512

      05c9bffc3f730bb3d0c45ff13a1aafbcee485a87711d56b17ba105a50af3f476841d87690bee21ab2165a05de771407b24641d4cacae3434741c5d3ac349bb16

    • SSDEEP

      3072:gFRfNqaAmTNQ0668lu9vQGX8DYIpDq1JrPZsleruOAg0FujDStSB6irks5N3c:qBfTT9H8lCvQPpDq1JrPlAOX6irF5N3c

    • Modifies security service

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Stops running service(s)

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks