General

  • Target

    4e9fff3d87862633176207d7501348a46e6e539180d63206fcb9a7e9533bfc0c

  • Size

    1.0MB

  • Sample

    230525-peeg5ahg79

  • MD5

    5d876a3f2e63985cd1a1acef1ced738d

  • SHA1

    2e5fd5786b16f52ae937a75b048049223f4365b6

  • SHA256

    4e9fff3d87862633176207d7501348a46e6e539180d63206fcb9a7e9533bfc0c

  • SHA512

    ebb48ead5b845e893ee56a54669dd5aa874ce991f9d52b515171bdd3c2921818cd50a55ae3f9943488b404e74cd155d47bef75f33575dc962cb0e32a4069d601

  • SSDEEP

    24576:pyucQgSU+My3dRTJluGA9V80+fY2ZvDxdvXMQhRti/:cucRSU+ztlTA9VAvD3fni

Malware Config

Extracted

Family

redline

Botnet

lina

C2

83.97.73.122:19062

Attributes
  • auth_value

    13523aee5d194d7716b22eeab7de10ad

Extracted

Family

redline

Botnet

fash

C2

83.97.73.122:19062

Attributes
  • auth_value

    dd7165bcd22b0ed3df426d944e12f136

Extracted

Family

gurcu

C2

https://api.telegram.org/bot6237712604:AAESgAGfaQ0EUC8eWgMd7kpAW_FEGRDRfDs/sendMessage?chat_id=880824160

Targets

    • Target

      4e9fff3d87862633176207d7501348a46e6e539180d63206fcb9a7e9533bfc0c

    • Size

      1.0MB

    • MD5

      5d876a3f2e63985cd1a1acef1ced738d

    • SHA1

      2e5fd5786b16f52ae937a75b048049223f4365b6

    • SHA256

      4e9fff3d87862633176207d7501348a46e6e539180d63206fcb9a7e9533bfc0c

    • SHA512

      ebb48ead5b845e893ee56a54669dd5aa874ce991f9d52b515171bdd3c2921818cd50a55ae3f9943488b404e74cd155d47bef75f33575dc962cb0e32a4069d601

    • SSDEEP

      24576:pyucQgSU+My3dRTJluGA9V80+fY2ZvDxdvXMQhRti/:cucRSU+ztlTA9VAvD3fni

    • Gurcu, WhiteSnake

      Gurcu is a malware stealer written in C#.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks