General

  • Target

    build.exe

  • Size

    4.9MB

  • Sample

    240321-gwsr3see5s

  • MD5

    287d2d8c6dc43061b992fd4767cac641

  • SHA1

    bc6076dd3684d56476c4424e8e7b42d0a7e29d64

  • SHA256

    d3231042d20e7e02069279a9470ede4daddf70137cf1122550e4bdc354ba1473

  • SHA512

    180950864c8e87d6051c690df40a0af9f834f864bd7de0b497728b219102415018669f7ca7eeb0f51ed8d06eb475e19415e277e531e80b4d5b6e463846b6c112

  • SSDEEP

    49152:CunOIh/VejoF8vwF/nluLRPct4whtfVKevv7m9gcQYPbH51a7zc60GtD:f/Veo8YF/nXMPbjAg60GtD

Malware Config

Extracted

Family

redline

Botnet

NewCrypt

C2

193.233.133.152:35515

Targets

    • Target

      build.exe

    • Size

      4.9MB

    • MD5

      287d2d8c6dc43061b992fd4767cac641

    • SHA1

      bc6076dd3684d56476c4424e8e7b42d0a7e29d64

    • SHA256

      d3231042d20e7e02069279a9470ede4daddf70137cf1122550e4bdc354ba1473

    • SHA512

      180950864c8e87d6051c690df40a0af9f834f864bd7de0b497728b219102415018669f7ca7eeb0f51ed8d06eb475e19415e277e531e80b4d5b6e463846b6c112

    • SSDEEP

      49152:CunOIh/VejoF8vwF/nluLRPct4whtfVKevv7m9gcQYPbH51a7zc60GtD:f/Veo8YF/nXMPbjAg60GtD

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks