General

  • Target

    73a4a78e6f117e74349ee159918448d6962886d8dce7765bbd42358dbabec73e

  • Size

    1.3MB

  • Sample

    231122-ea935aaa23

  • MD5

    a273ed2ce0666239e84f6b9d056b103a

  • SHA1

    d89d31e41467d9d5de4ebfb5197319632dd5e56b

  • SHA256

    73a4a78e6f117e74349ee159918448d6962886d8dce7765bbd42358dbabec73e

  • SHA512

    4874d96d4e06539b4f01ea9755197d72d9940cf78261a7a9ab3bcf3f8b8ea2e9670fdad9057808b035f9c34804678bf1cd7e05f4bb413fde287c9bdf68524e1c

  • SSDEEP

    24576:oyQUa2jZ+UtqIHgmM8JpgoCBWGpmKdV+lryaOB/zEb4AUEVPPDRK3:vBjZ++5gmMYxCmKdAlrRizE8AUQI

Malware Config

Extracted

Family

redline

Botnet

horda

C2

194.49.94.152:19053

Extracted

Family

risepro

C2

194.49.94.152

Targets

    • Target

      73a4a78e6f117e74349ee159918448d6962886d8dce7765bbd42358dbabec73e

    • Size

      1.3MB

    • MD5

      a273ed2ce0666239e84f6b9d056b103a

    • SHA1

      d89d31e41467d9d5de4ebfb5197319632dd5e56b

    • SHA256

      73a4a78e6f117e74349ee159918448d6962886d8dce7765bbd42358dbabec73e

    • SHA512

      4874d96d4e06539b4f01ea9755197d72d9940cf78261a7a9ab3bcf3f8b8ea2e9670fdad9057808b035f9c34804678bf1cd7e05f4bb413fde287c9bdf68524e1c

    • SSDEEP

      24576:oyQUa2jZ+UtqIHgmM8JpgoCBWGpmKdV+lryaOB/zEb4AUEVPPDRK3:vBjZ++5gmMYxCmKdAlrRizE8AUQI

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks