General

  • Target

    7e529e7385d36aff568fc23ebee74c2100407dd45ced3088190021be13eecf4c

  • Size

    1020KB

  • Sample

    230523-zhemeaab81

  • MD5

    47c9fad851d822398e63211fd7407f71

  • SHA1

    ea5154a47be879d569c966d217db9f6bc2eabe19

  • SHA256

    7e529e7385d36aff568fc23ebee74c2100407dd45ced3088190021be13eecf4c

  • SHA512

    dc7de56bf0534a764600dc010775b6cf1daed3aa4ab35e7375f9fddf0af9590f94df8cd2b1d47dee0b9affca7c179ef9581d0d6e4ead098c111f51a75eb354ab

  • SSDEEP

    24576:4yMVtu0XQyC6Ey1vL+k+lwA6ivn2XGH8A1pn7Y:/MVPQy5E2+Hwov

Malware Config

Extracted

Family

redline

Botnet

lupa

C2

83.97.73.122:19062

Attributes
  • auth_value

    6a764aa41830c77712442516d143bc9c

Targets

    • Target

      7e529e7385d36aff568fc23ebee74c2100407dd45ced3088190021be13eecf4c

    • Size

      1020KB

    • MD5

      47c9fad851d822398e63211fd7407f71

    • SHA1

      ea5154a47be879d569c966d217db9f6bc2eabe19

    • SHA256

      7e529e7385d36aff568fc23ebee74c2100407dd45ced3088190021be13eecf4c

    • SHA512

      dc7de56bf0534a764600dc010775b6cf1daed3aa4ab35e7375f9fddf0af9590f94df8cd2b1d47dee0b9affca7c179ef9581d0d6e4ead098c111f51a75eb354ab

    • SSDEEP

      24576:4yMVtu0XQyC6Ey1vL+k+lwA6ivn2XGH8A1pn7Y:/MVPQy5E2+Hwov

    • LoaderBot

      LoaderBot is a loader written in .NET downloading and executing miners.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • LoaderBot executable

    • XMRig Miner payload

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks