General

  • Target

    ca14f0ecae0fc32d937c0c3536204d0695bd5cdcb5dd1bc93b0db49281b6a6d9

  • Size

    1021KB

  • Sample

    230523-kgg9ksfd6w

  • MD5

    29fa5065e32794c09250f0e66c49a7ec

  • SHA1

    44734fce843620fa914d196b4977723197a70bd2

  • SHA256

    ca14f0ecae0fc32d937c0c3536204d0695bd5cdcb5dd1bc93b0db49281b6a6d9

  • SHA512

    e9e6f79d4d063378504515e2d924271bff170f94a03bd25e22eb659a85e4a84af69f38dcd3e6e9600e6f35f962c8e814b346328dbb876d9957f14d32592e3775

  • SSDEEP

    24576:2yZ3tNig+LAJvUvrqFNsYAPNlK/j/zVaNhNREyy:FZ9+LTvrEyYelK7zENe

Malware Config

Extracted

Family

redline

Botnet

luxa

C2

77.91.68.157:19065

Attributes
  • auth_value

    2dda654f9abf47e50c7446be3ecc1806

Targets

    • Target

      ca14f0ecae0fc32d937c0c3536204d0695bd5cdcb5dd1bc93b0db49281b6a6d9

    • Size

      1021KB

    • MD5

      29fa5065e32794c09250f0e66c49a7ec

    • SHA1

      44734fce843620fa914d196b4977723197a70bd2

    • SHA256

      ca14f0ecae0fc32d937c0c3536204d0695bd5cdcb5dd1bc93b0db49281b6a6d9

    • SHA512

      e9e6f79d4d063378504515e2d924271bff170f94a03bd25e22eb659a85e4a84af69f38dcd3e6e9600e6f35f962c8e814b346328dbb876d9957f14d32592e3775

    • SSDEEP

      24576:2yZ3tNig+LAJvUvrqFNsYAPNlK/j/zVaNhNREyy:FZ9+LTvrEyYelK7zENe

    • LoaderBot

      LoaderBot is a loader written in .NET downloading and executing miners.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • LoaderBot executable

    • XMRig Miner payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks