Resubmissions

28/11/2023, 16:39

231128-t57ntabe9x 4

26/11/2023, 09:59

231126-lz9l8agf38 6

26/11/2023, 09:34

231126-ljxygsge2y 10

26/11/2023, 08:47

231126-kp6l5sga27 10

18/11/2023, 13:27

231118-qqjrnaee32 1

18/11/2023, 12:49

231118-p2nz3sfa5z 8

15/11/2023, 11:22

231115-ngzemsag9s 10

15/11/2023, 10:40

231115-mqx3hafh55 8

04/11/2023, 09:34

231104-lj5y4agh72 1

General

  • Target

    https://google.com

  • Sample

    231126-kp6l5sga27

Malware Config

Extracted

Family

redline

Botnet

@heis999

C2

45.15.156.167:80

Targets

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Enterprise v15

Tasks