General

  • Target

    Setup.exe

  • Size

    11.5MB

  • Sample

    230207-cj8kjscb7y

  • MD5

    4e575e624b5d4822a17e98958410c4f5

  • SHA1

    fe8b87a7ee4bed3f44e47e335a9759bba086c61a

  • SHA256

    2772daff384534e0455b023285c177210bc038749038f8a41bc74e71b035d516

  • SHA512

    a1da1c612d9769f36dea6c9e299806ef56c84e0d28cbf88ebc14642b578a14b359456a7707c087299f4f976b28361328394af5089270ed2e8c0321267067eb43

  • SSDEEP

    3072:+QyZ/mEHgQS7vDYafnPq/KAlTSskcdE/Zli3sI1Snq51YZAkiMJ/c7Er2lJhbJdK:+lZtHHSr/AldE/ZRA11Cc7EOJ7q

Malware Config

Extracted

Family

redline

C2

95.217.14.200:34072

Attributes
  • auth_value

    1bfac947c350008abe813772b735f0fc

Extracted

Family

vidar

Version

2.2

Botnet

754

C2

https://t.me/litlebey

https://steamcommunity.com/profiles/76561199472399815

Attributes
  • profile_id

    754

Targets

    • Target

      Setup.exe

    • Size

      11.5MB

    • MD5

      4e575e624b5d4822a17e98958410c4f5

    • SHA1

      fe8b87a7ee4bed3f44e47e335a9759bba086c61a

    • SHA256

      2772daff384534e0455b023285c177210bc038749038f8a41bc74e71b035d516

    • SHA512

      a1da1c612d9769f36dea6c9e299806ef56c84e0d28cbf88ebc14642b578a14b359456a7707c087299f4f976b28361328394af5089270ed2e8c0321267067eb43

    • SSDEEP

      3072:+QyZ/mEHgQS7vDYafnPq/KAlTSskcdE/Zli3sI1Snq51YZAkiMJ/c7Er2lJhbJdK:+lZtHHSr/AldE/ZRA11Cc7EOJ7q

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks