General

  • Target

    2073e60238669378edde068984829664197b70d887e0b0a50fa4cbc5b60a673f

  • Size

    134KB

  • Sample

    230507-k2hqvafa5y

  • MD5

    19af66030d0dabbd36d2906899a7a1b8

  • SHA1

    84a40d96f95ceace89f5ad18bc7e7988c520772c

  • SHA256

    2073e60238669378edde068984829664197b70d887e0b0a50fa4cbc5b60a673f

  • SHA512

    f96638d275f39155eb8437a8d1302cca7dea5c487857f08a2335d91eb30b9333dd5fede86a8e5bbd7bd55f4881c76b1180d9056ae5c2a033eaa75e13597e4919

  • SSDEEP

    3072:oPzFghPAyW9Mhbf7OoT+3xTU4VwgWPoV2yem+Ej:YifWGbTlSTUjxyem+I

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://62.204.41.23/o.png

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://62.204.41.23/r.png

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://62.204.41.23/file.png

Extracted

Family

redline

Botnet

[ PRO ]

C2

185.161.248.16:26885

Attributes
  • auth_value

    b4958da54d1cdd9d9b28330afda1cc3c

Extracted

Family

systembc

C2

185.161.248.16:4440

Targets

    • Target

      2073e60238669378edde068984829664197b70d887e0b0a50fa4cbc5b60a673f

    • Size

      134KB

    • MD5

      19af66030d0dabbd36d2906899a7a1b8

    • SHA1

      84a40d96f95ceace89f5ad18bc7e7988c520772c

    • SHA256

      2073e60238669378edde068984829664197b70d887e0b0a50fa4cbc5b60a673f

    • SHA512

      f96638d275f39155eb8437a8d1302cca7dea5c487857f08a2335d91eb30b9333dd5fede86a8e5bbd7bd55f4881c76b1180d9056ae5c2a033eaa75e13597e4919

    • SSDEEP

      3072:oPzFghPAyW9Mhbf7OoT+3xTU4VwgWPoV2yem+Ej:YifWGbTlSTUjxyem+I

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • SystemBC

      SystemBC is a proxy and remote administration tool first seen in 2019.

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks