General

  • Target

    cc4c6626210fccb8dee4a91d0adea0690c740b66ae6afdc30bad12f71f998953

  • Size

    1.1MB

  • Sample

    231116-t6nbkadb38

  • MD5

    3dbe03ccb61cfdf82e6d82ece1a1e07e

  • SHA1

    b253089487921f3e0fb9f2a214f06eaf08304baf

  • SHA256

    cc4c6626210fccb8dee4a91d0adea0690c740b66ae6afdc30bad12f71f998953

  • SHA512

    cb92241024b21ea6c1b2af2eea52575720eb6bc53fddd3f12a67e39bc4a4930ba357adb028f96d89f966f829dd6d8a2dcf66d2821ee14787b378a415f9bd45f0

  • SSDEEP

    24576:Qyj8SUImhiBFKsUwluMbcfyDOKcdvFzoioQx:XIXcBUwluMlDkvFMc

Malware Config

Extracted

Family

redline

Botnet

horda

C2

194.49.94.152:19053

Extracted

Family

risepro

C2

194.49.94.152

Targets

    • Target

      cc4c6626210fccb8dee4a91d0adea0690c740b66ae6afdc30bad12f71f998953

    • Size

      1.1MB

    • MD5

      3dbe03ccb61cfdf82e6d82ece1a1e07e

    • SHA1

      b253089487921f3e0fb9f2a214f06eaf08304baf

    • SHA256

      cc4c6626210fccb8dee4a91d0adea0690c740b66ae6afdc30bad12f71f998953

    • SHA512

      cb92241024b21ea6c1b2af2eea52575720eb6bc53fddd3f12a67e39bc4a4930ba357adb028f96d89f966f829dd6d8a2dcf66d2821ee14787b378a415f9bd45f0

    • SSDEEP

      24576:Qyj8SUImhiBFKsUwluMbcfyDOKcdvFzoioQx:XIXcBUwluMlDkvFMc

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks