General

  • Target

    c6eb63a111775ad7067b7bbabff4fe2c8c771185a6c43300a3820957c27c610e

  • Size

    1.0MB

  • Sample

    230525-q4256abb6w

  • MD5

    32b88f66ed05dfb4c1f85f7652125e66

  • SHA1

    aa04333e92ef50f445002fccc79816dd420db6b3

  • SHA256

    c6eb63a111775ad7067b7bbabff4fe2c8c771185a6c43300a3820957c27c610e

  • SHA512

    4646c089add169559144d2d871fbee00c47bc1686fca00f8d14752e8a747b9bd50184ee097f478926635187c51cdd66adc1a77f72025cdf43be81aa6b7bcdf8a

  • SSDEEP

    24576:dyj3BhBj8fbUp6VWHu0pf9FoZnvPUYrwAWh/if:4j3BXjtU4HkJ4q

Malware Config

Extracted

Family

redline

Botnet

lina

C2

83.97.73.122:19062

Attributes
  • auth_value

    13523aee5d194d7716b22eeab7de10ad

Extracted

Family

redline

Botnet

fash

C2

83.97.73.122:19062

Attributes
  • auth_value

    dd7165bcd22b0ed3df426d944e12f136

Extracted

Family

gurcu

C2

https://api.telegram.org/bot6237712604:AAESgAGfaQ0EUC8eWgMd7kpAW_FEGRDRfDs/sendMessage?chat_id=880824160

Targets

    • Target

      c6eb63a111775ad7067b7bbabff4fe2c8c771185a6c43300a3820957c27c610e

    • Size

      1.0MB

    • MD5

      32b88f66ed05dfb4c1f85f7652125e66

    • SHA1

      aa04333e92ef50f445002fccc79816dd420db6b3

    • SHA256

      c6eb63a111775ad7067b7bbabff4fe2c8c771185a6c43300a3820957c27c610e

    • SHA512

      4646c089add169559144d2d871fbee00c47bc1686fca00f8d14752e8a747b9bd50184ee097f478926635187c51cdd66adc1a77f72025cdf43be81aa6b7bcdf8a

    • SSDEEP

      24576:dyj3BhBj8fbUp6VWHu0pf9FoZnvPUYrwAWh/if:4j3BXjtU4HkJ4q

    • Gurcu, WhiteSnake

      Gurcu is a malware stealer written in C#.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks