General

  • Target

    Setup.exe

  • Size

    5.0MB

  • Sample

    230421-tze2lsaf9x

  • MD5

    36ec5db7a7da85a85416870098529108

  • SHA1

    5f2052d19badb1a953fb53aae197d7126106beb6

  • SHA256

    b86b793d720b43d3fb1525f98758256d1ccf4ed543dc1bd01b54921f7143fb46

  • SHA512

    00e544be80e53281a6e66c473a8d8c436003fe76f1b464515ba5f50b523c40acc302ba3d348d1cbbd2970611127fd336e84de9a3f55ab85e46ceb512ed5c7b9b

  • SSDEEP

    49152:SZWMqic3obV0//WmD1ufCiORefaMG2wyFK7O3c194MXxdhtF4My9KMlenxepLMz:JMNRb6HdjSZZFKy7MhPOg

Malware Config

Extracted

Family

redline

Botnet

TEST 21.04.2023

C2

88.218.171.68:20005

Attributes
  • auth_value

    a6b4c490205db18f22abb83df6a972f1

Targets

    • Target

      Setup.exe

    • Size

      5.0MB

    • MD5

      36ec5db7a7da85a85416870098529108

    • SHA1

      5f2052d19badb1a953fb53aae197d7126106beb6

    • SHA256

      b86b793d720b43d3fb1525f98758256d1ccf4ed543dc1bd01b54921f7143fb46

    • SHA512

      00e544be80e53281a6e66c473a8d8c436003fe76f1b464515ba5f50b523c40acc302ba3d348d1cbbd2970611127fd336e84de9a3f55ab85e46ceb512ed5c7b9b

    • SSDEEP

      49152:SZWMqic3obV0//WmD1ufCiORefaMG2wyFK7O3c194MXxdhtF4My9KMlenxepLMz:JMNRb6HdjSZZFKy7MhPOg

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks