General

  • Target

    cca6e4355cfdbbd8cbbb95338cbd8fdd72b6bb105b6468e366b69eba4a761b98

  • Size

    834KB

  • Sample

    240417-qll18ahb69

  • MD5

    86061df32a538cbca7f6b618646eb85c

  • SHA1

    685c2c3d853804abf65e0e0f2c6b2481d04b60ba

  • SHA256

    cca6e4355cfdbbd8cbbb95338cbd8fdd72b6bb105b6468e366b69eba4a761b98

  • SHA512

    2cbbe76a46baf2c1e2c406f76dc02e5d9717b54733f73dfabd42fd9c7ae8230713442158eb56f3a770c6b8fcd4297d950b1a969d472c821f43329ceeef580d41

  • SSDEEP

    24576:INxVwHVmfOzA7//MVcNtyxHPhKUJTuhHWtDI:Iw1zALcewvhhTu2tDI

Malware Config

Extracted

Family

redline

Botnet

breha

C2

77.91.124.55:19071

Targets

    • Target

      b8c4184e57c309b868bcd24bd67890a8549d93b8919ef57d00907bb0769ce7a2.exe

    • Size

      878KB

    • MD5

      d318c6337d7cad78817bd3b9b3f43bc5

    • SHA1

      dbf134d1a4d1d712bd4d917bba0c2545fb5f901d

    • SHA256

      b8c4184e57c309b868bcd24bd67890a8549d93b8919ef57d00907bb0769ce7a2

    • SHA512

      4b3f8c606d1f33c823c3fa74f560208d951d4591a1fb894de6919eb809ce167fe0e5498eb89c3f3ef4c231580bad8ec5d7bc4bd2f1d0974bcd9571b4bac4a4b0

    • SSDEEP

      12288:KMr0y90qyaqD7Ok06pNmgoVKDrk4qKdFagXt0ogWtTlY3tXrGlqFfmef2mglg+x2:GyCdce3DrkaTRgAitbGUR2maXIJp

    • Detect Mystic stealer payload

    • Modifies Windows Defender Real-time Protection settings

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Impair Defenses

1
T1562

Disable or Modify Tools

1
T1562.001

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Tasks