Resubmissions

15-01-2024 13:16

240115-qhxnjsgdgk 1

02-01-2024 07:45

240102-jlpzjsgdg8 8

01-01-2024 19:34

240101-x93gfagcaj 1

01-01-2024 19:21

240101-x2y42saff3 6

01-01-2024 12:16

240101-pfkqjaafan 6

31-12-2023 10:47

231231-mvqh8ahdb5 1

29-12-2023 09:34

231229-lj6wdsgch5 6

28-12-2023 06:08

231228-gv5p9adaeq 1

28-12-2023 05:48

231228-ghrmvsahal 7

28-12-2023 05:47

231228-ghbawaagel 1

General

  • Target

    https://github.com

  • Sample

    231130-ll2z8aac91

Malware Config

Extracted

Family

redline

Botnet

@heis999

C2

45.15.156.167:80

Targets

    • Target

      https://github.com

    • Detect Umbral payload

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks