General

  • Target

    c068aae17f843ffc60c792336879c570.exe

  • Size

    916KB

  • Sample

    230524-hw3sqabc26

  • MD5

    c068aae17f843ffc60c792336879c570

  • SHA1

    47dad1f6396317f2d0591bb674ab7d6113e87611

  • SHA256

    1e5f2c0b0ce987ff58c642c4c98ab60c79453d0f6ac4de50de382917e2a1d518

  • SHA512

    65d29971233001088ac5ad0e52dff7484e156d4c79e320242fc8bb5548f42f4dcf20af5adce1e5bff377bdf7dd5b8b1bbc574e79c8b0237bdccf1d140e19a27f

  • SSDEEP

    24576:dyOYs7tghLdXyOAP19W6FnsEE2nCfzDI:4OYHLdXs9YssJ2n0D

Malware Config

Extracted

Family

redline

Botnet

lupa

C2

83.97.73.122:19062

Attributes
  • auth_value

    6a764aa41830c77712442516d143bc9c

Targets

    • Target

      c068aae17f843ffc60c792336879c570.exe

    • Size

      916KB

    • MD5

      c068aae17f843ffc60c792336879c570

    • SHA1

      47dad1f6396317f2d0591bb674ab7d6113e87611

    • SHA256

      1e5f2c0b0ce987ff58c642c4c98ab60c79453d0f6ac4de50de382917e2a1d518

    • SHA512

      65d29971233001088ac5ad0e52dff7484e156d4c79e320242fc8bb5548f42f4dcf20af5adce1e5bff377bdf7dd5b8b1bbc574e79c8b0237bdccf1d140e19a27f

    • SSDEEP

      24576:dyOYs7tghLdXyOAP19W6FnsEE2nCfzDI:4OYHLdXs9YssJ2n0D

    • LoaderBot

      LoaderBot is a loader written in .NET downloading and executing miners.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • LoaderBot executable

    • XMRig Miner payload

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks