General

  • Target

    Easy_L0ader.rar

  • Size

    35.7MB

  • Sample

    240217-w759wahf8x

  • MD5

    8e4cbe4e5ecabd01fa483dca6ec16537

  • SHA1

    9307be3b07f992965dc430aaedd78ca6bbf2f33e

  • SHA256

    970c25a64e64286009cec1758ea21643f2327361b66262768489cc9a77c9d6bd

  • SHA512

    7407adb0765c5e2a75ef0a8d8a9f5c51d69cd50315f7a49d9334e325cc57e2b9e58ab79a1f8c4b401767c32c95c4dbd824a5f07291db72151b5fffa3be88ceab

  • SSDEEP

    786432:KUnIK3Yvyn+3tF52WjM3QEgCjI4PqNwp/7Nm5bUKVrGc9Cn2AT78vi:FnIKOynEt2aOIrY/7SbPVrGck2A78K

Malware Config

Extracted

Family

redline

Botnet

@l0rd667

C2

45.15.156.167:80

Targets

    • Target

      Easy_L0ader.rar

    • Size

      35.7MB

    • MD5

      8e4cbe4e5ecabd01fa483dca6ec16537

    • SHA1

      9307be3b07f992965dc430aaedd78ca6bbf2f33e

    • SHA256

      970c25a64e64286009cec1758ea21643f2327361b66262768489cc9a77c9d6bd

    • SHA512

      7407adb0765c5e2a75ef0a8d8a9f5c51d69cd50315f7a49d9334e325cc57e2b9e58ab79a1f8c4b401767c32c95c4dbd824a5f07291db72151b5fffa3be88ceab

    • SSDEEP

      786432:KUnIK3Yvyn+3tF52WjM3QEgCjI4PqNwp/7Nm5bUKVrGc9Cn2AT78vi:FnIKOynEt2aOIrY/7SbPVrGck2A78K

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks