General

  • Target

    65711cb0f3baca62e491743186b9d294b8a5e68bf132cacc5697c2210ac42a58

  • Size

    1.0MB

  • Sample

    230526-t8tw5agh4v

  • MD5

    786b2426d6e3657f80244cf820acce23

  • SHA1

    72e7ac08436e4c15b4a6f63a60976df5d5e60501

  • SHA256

    65711cb0f3baca62e491743186b9d294b8a5e68bf132cacc5697c2210ac42a58

  • SHA512

    88b360e7de409dd15b375fde34fca920395643add97369a1ce51cddbb29786a717618d747132d9b36479d2bcdcfe2ae6d7837963c289b74651e094dcd7bcdde6

  • SSDEEP

    24576:/yDLLtBWa5JM/78mVbfKe8laUDZTVATGngs:KDLL6aw9lfjeZTe0

Malware Config

Extracted

Family

redline

Botnet

lisa

C2

83.97.73.122:19062

Attributes
  • auth_value

    c2dc311db9820012377b054447d37949

Extracted

Family

redline

Botnet

goga

C2

83.97.73.122:19062

Attributes
  • auth_value

    6d57dff6d3c42dddb8a76dc276b8467f

Extracted

Family

gurcu

C2

https://api.telegram.org/bot5948365373:AAHGoShKq2YoPLHuMrakRbVNthbMABFYHUc/sendMessage?chat_id=-1001620069625

Targets

    • Target

      65711cb0f3baca62e491743186b9d294b8a5e68bf132cacc5697c2210ac42a58

    • Size

      1.0MB

    • MD5

      786b2426d6e3657f80244cf820acce23

    • SHA1

      72e7ac08436e4c15b4a6f63a60976df5d5e60501

    • SHA256

      65711cb0f3baca62e491743186b9d294b8a5e68bf132cacc5697c2210ac42a58

    • SHA512

      88b360e7de409dd15b375fde34fca920395643add97369a1ce51cddbb29786a717618d747132d9b36479d2bcdcfe2ae6d7837963c289b74651e094dcd7bcdde6

    • SSDEEP

      24576:/yDLLtBWa5JM/78mVbfKe8laUDZTVATGngs:KDLL6aw9lfjeZTe0

    • Gurcu, WhiteSnake

      Gurcu is a malware stealer written in C#.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks