General

  • Target

    202040bebe757e0adc39d99b3d7327e79e0354b43f2a6c6fe0d1c1362d3e4198

  • Size

    1.1MB

  • Sample

    231117-vv8zkabf54

  • MD5

    2a0c21ee9b17ce0cd8c48c3d0f9d977e

  • SHA1

    d02d327e0e0a891de8f829d00605d537437d3867

  • SHA256

    202040bebe757e0adc39d99b3d7327e79e0354b43f2a6c6fe0d1c1362d3e4198

  • SHA512

    ea40fc8640943ed73e0f1bb93e1e7d8fc36ab4d417ff6a785330b1f5d9632d08a8e45499d1a86fba32979c853ffa80e2eafab786b2a2e822430f563b8185e333

  • SSDEEP

    24576:hyWoAbkIuWxV6pLSGIuIuGqReUE/j+0hjJ3mK2ybqkm6YXUl:UZAbiEV6tLEUE//jkKfeAYk

Malware Config

Extracted

Family

redline

Botnet

horda

C2

194.49.94.152:19053

Extracted

Family

risepro

C2

194.49.94.152

Targets

    • Target

      202040bebe757e0adc39d99b3d7327e79e0354b43f2a6c6fe0d1c1362d3e4198

    • Size

      1.1MB

    • MD5

      2a0c21ee9b17ce0cd8c48c3d0f9d977e

    • SHA1

      d02d327e0e0a891de8f829d00605d537437d3867

    • SHA256

      202040bebe757e0adc39d99b3d7327e79e0354b43f2a6c6fe0d1c1362d3e4198

    • SHA512

      ea40fc8640943ed73e0f1bb93e1e7d8fc36ab4d417ff6a785330b1f5d9632d08a8e45499d1a86fba32979c853ffa80e2eafab786b2a2e822430f563b8185e333

    • SSDEEP

      24576:hyWoAbkIuWxV6pLSGIuIuGqReUE/j+0hjJ3mK2ybqkm6YXUl:UZAbiEV6tLEUE//jkKfeAYk

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks