General

  • Target

    RedlineStealer.zip

  • Size

    2.7MB

  • Sample

    231114-18btwahe4z

  • MD5

    686d45bc96c860653d9cb51eb5246d88

  • SHA1

    08dd2200eee2ee0fce56308cca0d1985671cf574

  • SHA256

    bc7b762dc2dc3df9002845387118401bb2cd93e4a2f3af013509e8285860a57b

  • SHA512

    59037bf067a9ed704014b096115b4b915b965f1b40d324344ed6e73e76889b825b3f9d3d052b4fa9bdf0cfc9d410e71cf07314a49ae016ac95040b3b3281ff2a

  • SSDEEP

    49152:ufgghZ7GXzJef+bGOG9yOjwbwd1fA/D0TslvAeK2elNAeB5v9IGgVcWIVYgmhZJ:XXzJefnyrEd1fAr0Yl22elTSGgaWkYgq

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://5.42.92.190/fks/index.php

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Extracted

Family

smokeloader

Botnet

up3

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Extracted

Family

raccoon

Botnet

c78f27a0d43f29dbd112dbd9e387406b

C2

http://31.192.237.23:80/

http://193.233.132.12:80/

Attributes
  • user_agent

    SunShineMoonLight

xor.plain

Extracted

Family

redline

Botnet

@ytlogsbot

C2

194.169.175.235:42691

Extracted

Family

redline

Botnet

LiveTraffic

C2

195.10.205.16:1056

Targets

    • Target

      RedlineStealer.zip

    • Size

      2.7MB

    • MD5

      686d45bc96c860653d9cb51eb5246d88

    • SHA1

      08dd2200eee2ee0fce56308cca0d1985671cf574

    • SHA256

      bc7b762dc2dc3df9002845387118401bb2cd93e4a2f3af013509e8285860a57b

    • SHA512

      59037bf067a9ed704014b096115b4b915b965f1b40d324344ed6e73e76889b825b3f9d3d052b4fa9bdf0cfc9d410e71cf07314a49ae016ac95040b3b3281ff2a

    • SSDEEP

      49152:ufgghZ7GXzJef+bGOG9yOjwbwd1fA/D0TslvAeK2elNAeB5v9IGgVcWIVYgmhZJ:XXzJefnyrEd1fAr0Yl22elTSGgaWkYgq

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer payload

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks