General

  • Target

    New_Soft.rar

  • Size

    1.5MB

  • Sample

    230206-ksl2xagc2y

  • MD5

    6378379daca7fa3f6c26a72c8473ffbe

  • SHA1

    b4fa40a450199b76947e1c0a65f62795f45ce930

  • SHA256

    dad041f1ddd40e5fa1430a4e3724c84efa70aba942b94aa4094b5ae192502096

  • SHA512

    c6bcbe7a81866eb1157d6b3815e1008843428270fe0bfa0611fafd9e3a44b62e36e8a1acd315a4d2da68a758fcb495d1388cff7a505b0d5f3fbd79442beacc9a

  • SSDEEP

    24576:Z0qW83IR8FjyFhH/mfB1UpFAZqxL7zeL4gsJGq9fSYV516Lrdd2Tt39bjBXj1Mha:Z0qW8MqcfmfX0FBX2Q9xsLXwjRj1AG

Malware Config

Extracted

Family

redline

Botnet

zormionYT

C2

82.115.223.77:38358

Attributes
  • auth_value

    b3ee9e77cc6b7b11d963f3a2d44c57ad

Targets

    • Target

      New_Soft.rar

    • Size

      1.5MB

    • MD5

      6378379daca7fa3f6c26a72c8473ffbe

    • SHA1

      b4fa40a450199b76947e1c0a65f62795f45ce930

    • SHA256

      dad041f1ddd40e5fa1430a4e3724c84efa70aba942b94aa4094b5ae192502096

    • SHA512

      c6bcbe7a81866eb1157d6b3815e1008843428270fe0bfa0611fafd9e3a44b62e36e8a1acd315a4d2da68a758fcb495d1388cff7a505b0d5f3fbd79442beacc9a

    • SSDEEP

      24576:Z0qW83IR8FjyFhH/mfB1UpFAZqxL7zeL4gsJGq9fSYV516Lrdd2Tt39bjBXj1Mha:Z0qW8MqcfmfX0FBX2Q9xsLXwjRj1AG

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks