General

  • Target

    7ee89d39a9b84d5485a2095533aeb1a1d789abe43f41106bf9e16aae1a7cb6e1

  • Size

    260KB

  • Sample

    240506-n9dzeabb4t

  • MD5

    d747de5b8a66f98749ec6d4f6eec146d

  • SHA1

    3f141e7581601248cdb72dd1e9111b23d77b06b8

  • SHA256

    7ee89d39a9b84d5485a2095533aeb1a1d789abe43f41106bf9e16aae1a7cb6e1

  • SHA512

    c606903ea78fa54f7dc4eadf2537a166570a587f6945d359e04b52ec70eaa86725f4803a89f144500bf91544938a4a6be783312d82c68d251b90904dba0869ef

  • SSDEEP

    6144:7qv0db3lJzrCc+3smmVvvJReADYO0m0yI:nb3XVcsm0vEc0B

Malware Config

Extracted

Family

redline

Botnet

5637482599

C2

https://pastebin.com/raw/NgsUAPya

Targets

    • Target

      7ee89d39a9b84d5485a2095533aeb1a1d789abe43f41106bf9e16aae1a7cb6e1

    • Size

      260KB

    • MD5

      d747de5b8a66f98749ec6d4f6eec146d

    • SHA1

      3f141e7581601248cdb72dd1e9111b23d77b06b8

    • SHA256

      7ee89d39a9b84d5485a2095533aeb1a1d789abe43f41106bf9e16aae1a7cb6e1

    • SHA512

      c606903ea78fa54f7dc4eadf2537a166570a587f6945d359e04b52ec70eaa86725f4803a89f144500bf91544938a4a6be783312d82c68d251b90904dba0869ef

    • SSDEEP

      6144:7qv0db3lJzrCc+3smmVvvJReADYO0m0yI:nb3XVcsm0vEc0B

    • Detect ZGRat V1

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks