General

  • Target

    93df945e9db900adc7ef9b53ee40deeeb2a2e894b599ead8a69162398cfede6f

  • Size

    260KB

  • Sample

    240506-lsyalsgb7y

  • MD5

    5210d8d3976e711feb40d473fdd53d43

  • SHA1

    0f5060470519bbdebb6363317af72427c7df9164

  • SHA256

    93df945e9db900adc7ef9b53ee40deeeb2a2e894b599ead8a69162398cfede6f

  • SHA512

    b6eae99a2f93d134833c685bdcbd0697832602f15f7a61c9101aad5dcc9a9bc51879d37048a44f5e2edb3243df6b8b9a1a159322c60e20217a08c98456b53937

  • SSDEEP

    6144:Yqv0wb31JzKy0Nrg6BVnpfX4/cMQebK40:Zb3H0jJsS40

Malware Config

Extracted

Family

redline

Botnet

5345987420

C2

https://pastebin.com/raw/KE5Mft0T

Targets

    • Target

      93df945e9db900adc7ef9b53ee40deeeb2a2e894b599ead8a69162398cfede6f

    • Size

      260KB

    • MD5

      5210d8d3976e711feb40d473fdd53d43

    • SHA1

      0f5060470519bbdebb6363317af72427c7df9164

    • SHA256

      93df945e9db900adc7ef9b53ee40deeeb2a2e894b599ead8a69162398cfede6f

    • SHA512

      b6eae99a2f93d134833c685bdcbd0697832602f15f7a61c9101aad5dcc9a9bc51879d37048a44f5e2edb3243df6b8b9a1a159322c60e20217a08c98456b53937

    • SSDEEP

      6144:Yqv0wb31JzKy0Nrg6BVnpfX4/cMQebK40:Zb3H0jJsS40

    • Detect ZGRat V1

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks