Resubmissions

23-09-2023 06:20

230923-g3294afc74 6

22-09-2023 09:24

230922-ldawrshb83 10

21-09-2023 15:40

230921-s4gwbsha8z 4

19-09-2023 16:03

230919-thpvgscc79 1

19-09-2023 13:37

230919-qw5w3shc6s 10

19-09-2023 13:25

230919-qn8yrsbc63 10

13-09-2023 11:47

230913-nx8m9aeb62 4

12-09-2023 19:11

230912-xv98qshf86 10

12-09-2023 19:03

230912-xqr7cshf46 10

12-09-2023 11:47

230912-nybd5sca41 1

General

  • Target

    https://google.com

  • Sample

    230919-qn8yrsbc63

Malware Config

Targets

    • Target

      https://google.com

    • Modifies Windows Defender Real-time Protection settings

    • Modifies security service

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Stops running service(s)

    • Executes dropped EXE

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Create or Modify System Process

3
T1543

Windows Service

3
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Privilege Escalation

Create or Modify System Process

3
T1543

Windows Service

3
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Defense Evasion

Modify Registry

3
T1112

Impair Defenses

2
T1562

Disable or Modify Tools

1
T1562.001

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

4
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

3
T1082

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Impact

Service Stop

1
T1489

Tasks