General

  • Target

    1fd972fa7b5d9b8b1457dd025aa1ffe7.exe

  • Size

    25.6MB

  • Sample

    230720-j1jq3sdf84

  • MD5

    1fd972fa7b5d9b8b1457dd025aa1ffe7

  • SHA1

    2879d38e0b6fe1b930fafbe6415b641b5efc68e4

  • SHA256

    520044b6e34ca534c0a4d97abd318a8db37169f18f8c1e385f3d5b79df9d025d

  • SHA512

    9f5869d6e6ae67559f5a82d0841307ac1b6d09946c5ba963964d6a01e1c9aa17a229bfe30ec67e72c7f514e21c585c8ad1369bb6100d1aa16de3f829e7f527e1

  • SSDEEP

    98304:ylQKxQh+98myGsy1slENtrE7pQ8kq34vEStCAsDrP7J8yStyBCWLRV7VtC4bksxI:uQPY9mgGvkHEAsdtLRVRXgFqKQbEZxRp

Malware Config

Extracted

Family

redline

Botnet

LXIX

C2

5.35.33.167:17154

Attributes
  • auth_value

    3f30d9c8480a0830cfcc9a091fac5fca

Targets

    • Target

      1fd972fa7b5d9b8b1457dd025aa1ffe7.exe

    • Size

      25.6MB

    • MD5

      1fd972fa7b5d9b8b1457dd025aa1ffe7

    • SHA1

      2879d38e0b6fe1b930fafbe6415b641b5efc68e4

    • SHA256

      520044b6e34ca534c0a4d97abd318a8db37169f18f8c1e385f3d5b79df9d025d

    • SHA512

      9f5869d6e6ae67559f5a82d0841307ac1b6d09946c5ba963964d6a01e1c9aa17a229bfe30ec67e72c7f514e21c585c8ad1369bb6100d1aa16de3f829e7f527e1

    • SSDEEP

      98304:ylQKxQh+98myGsy1slENtrE7pQ8kq34vEStCAsDrP7J8yStyBCWLRV7VtC4bksxI:uQPY9mgGvkHEAsdtLRVRXgFqKQbEZxRp

    • Aurora

      Aurora is a crypto wallet stealer written in Golang.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Shurk

      Shurk is an infostealer, written in C++ which appeared in 2021.

    • Shurk Stealer payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks