General

  • Target

    SecuriteInfo.com.Win32.PWSX-gen.23210.9609

  • Size

    434KB

  • Sample

    240112-2bby2sfbgj

  • MD5

    49a101f27b36c7ee8a0931a656749c43

  • SHA1

    13874d352aa3fbb9a262e29c03ff885714ff8429

  • SHA256

    b61c3baadd541bcafad124668888e322d70720335a6f46173b489a47d5b66c1c

  • SHA512

    121f6b0b8c8342df96837e173cac6814fff315385a2f1a234b77c5b59fd661930b6f67e910f797db2f7a69d00f282dd9788770925c8390dfe6abcb52ac612ad3

  • SSDEEP

    6144:1T0hyKyHzHfy5joC2zBtT5GNtBFeO1gqcID8kfn5oNfNvX82a7m5BIks:ihiHzHKjo7F/Gt0wLcE5UfNMdm5

Malware Config

Extracted

Family

redline

Botnet

Bloomberg

C2

194.33.191.102:21751

Targets

    • Target

      SecuriteInfo.com.Win32.PWSX-gen.23210.9609

    • Size

      434KB

    • MD5

      49a101f27b36c7ee8a0931a656749c43

    • SHA1

      13874d352aa3fbb9a262e29c03ff885714ff8429

    • SHA256

      b61c3baadd541bcafad124668888e322d70720335a6f46173b489a47d5b66c1c

    • SHA512

      121f6b0b8c8342df96837e173cac6814fff315385a2f1a234b77c5b59fd661930b6f67e910f797db2f7a69d00f282dd9788770925c8390dfe6abcb52ac612ad3

    • SSDEEP

      6144:1T0hyKyHzHfy5joC2zBtT5GNtBFeO1gqcID8kfn5oNfNvX82a7m5BIks:ihiHzHKjo7F/Gt0wLcE5UfNMdm5

    • Detect ZGRat V1

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks