General

  • Target

    [Guru3D.com]-DDU.zip

  • Size

    1.0MB

  • Sample

    240404-xxngrafg2x

  • MD5

    44d6b1cb0048e2fa86660f544ad7514e

  • SHA1

    3220492406dedfa7c06da501a90c7709db413e0a

  • SHA256

    88084522252c8dbc909963aa0f77c57023ec0f4cb369f34028a14740a8883bc4

  • SHA512

    d1d00cfb3e2f7595da04c7a1ef91c9e8ceca7d86c538982719fe70ca0c5f0a040fc60c09a5d86a4b32b86615f1881f27f80512c24da69413d03e26f812588aaf

  • SSDEEP

    24576:TL+W5oEZnwW2lDQ2De4SHHZ6wRJhf6FZdB+7Q:TLhdDMXDe4SMwRjwZD2Q

Malware Config

Extracted

Family

redline

Botnet

LM

C2

147.45.47.65:47232

Targets

    • Target

      DDU v18.0.7.4.exe

    • Size

      1.1MB

    • MD5

      4ce869057d2e41bcc32e2d068fea9f3c

    • SHA1

      4b35bde68c49bf24e3c72a666401a74ca5d6b530

    • SHA256

      e3c1b15399636b925a082fb63806b1c42ef09e347bb3f1227bd07c743684ccfa

    • SHA512

      71a63cdc81a44314ba1794b279ae50b2c0d4848116c931c2596b09f552419a6774b836ed84f8318a9984bc67217876e48796d3e8bcde8343110cc254d7d252da

    • SSDEEP

      24576:PVDTk3iXN0xaU7+Aljw02j5Q6Vo4qd1T6wd3lvsV33nsvme:RommD5NklVo4q2wdts33+Z

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks