General

  • Target

    8601b9efdac4733e888cc949f337cfbba4140a6a441aaefe2ab391b4d637dfbc.zip

  • Size

    1.3MB

  • Sample

    230208-lwmnaaaa49

  • MD5

    fb78dac65b7560df3a1e8cc2e17e55b8

  • SHA1

    a3d278837296452e5750d7e4381ef4a7990cbade

  • SHA256

    be09924a971a4de61cb2e9f031829d8ceb9822e5c54357b3fdb09fee72b781b2

  • SHA512

    b6fc6d363df5bd28262233c160cfae8587ddf7203fb5dd15396359c56c158f92e32efa41ed42a75f24a0d8ba119e55e99be7f29d59ca32f84d6d353034df5505

  • SSDEEP

    24576:zzdZ7wcaoqOyH1M32XLBbat50hbnvTssgsYabFcTSEsRv:zhZ0cmzXVoehbvosUKcTSN

Malware Config

Extracted

Family

redline

Botnet

HWID-SPOOFER

C2

amrican-sport-live-stream.cc:4581

Attributes
  • auth_value

    82cc1998a304a60caeeadbaf5bb109cb

Targets

    • Target

      8601b9efdac4733e888cc949f337cfbba4140a6a441aaefe2ab391b4d637dfbc.exe

    • Size

      1.3MB

    • MD5

      b4138222931b8458a109d11cd2194ce8

    • SHA1

      3b78247eea213f18d0fa745860b3099238b31fe9

    • SHA256

      8601b9efdac4733e888cc949f337cfbba4140a6a441aaefe2ab391b4d637dfbc

    • SHA512

      8b7f99577a57e42fd9e302ed979a940fc6e64bdc6457866702af44272223c439e5128461120c68b88eed8d6d5257b7e29eb4625a62d9680cd2cf29feff3392bb

    • SSDEEP

      24576:dpxRSasbbtRTnQ5sUm0n0m4DH5fS9Mr9CKkMcvBJsJYs45Z3S8IVej:dpfSamk5sUm0nXsCMkDBU16Z3w

    • Detect PureCrypter injector

    • PureCrypter

      PureCrypter is a .NET malware loader first seen in early 2021.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks