General

  • Target

    8f04f8e4f87a7e19053f745b6fbcb795.exe

  • Size

    2.4MB

  • Sample

    230311-nmkhnsbc3s

  • MD5

    8f04f8e4f87a7e19053f745b6fbcb795

  • SHA1

    5207f1704c26b19ab175882ab03a13aa42f88f48

  • SHA256

    3944a1d4b4fdf0b1a5aecaa579a3c9acac4536544b440acc8362d456f46d3cb4

  • SHA512

    89d372996ecf01293d69267b4c151e59a4dca3968c9f28d5795d620a45232b2ccd3aa29aa87eb540c44d06541d90dbfd5c020c77a0d850e5a4f0eee063a9fe5a

  • SSDEEP

    49152:Lp7dJRVGJ0vXg055FGLXBFC/tU6aqws96MayXjq7262LMJfS4h1Y:Lp7dJR0+vXg055FSXBFC1gq9kM3zm0MG

Malware Config

Extracted

Family

redline

Botnet

red1

C2

34.141.168.40:80

34.125.68.133:80

Attributes
  • auth_value

    70f607e482f39051bebe438c28d43e46

Targets

    • Target

      8f04f8e4f87a7e19053f745b6fbcb795.exe

    • Size

      2.4MB

    • MD5

      8f04f8e4f87a7e19053f745b6fbcb795

    • SHA1

      5207f1704c26b19ab175882ab03a13aa42f88f48

    • SHA256

      3944a1d4b4fdf0b1a5aecaa579a3c9acac4536544b440acc8362d456f46d3cb4

    • SHA512

      89d372996ecf01293d69267b4c151e59a4dca3968c9f28d5795d620a45232b2ccd3aa29aa87eb540c44d06541d90dbfd5c020c77a0d850e5a4f0eee063a9fe5a

    • SSDEEP

      49152:Lp7dJRVGJ0vXg055FGLXBFC/tU6aqws96MayXjq7262LMJfS4h1Y:Lp7dJR0+vXg055FSXBFC1gq9kM3zm0MG

    • Detect PureCrypter injector

    • PureCrypter

      PureCrypter is a .NET malware loader first seen in early 2021.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks