General

  • Target

    50aab0a87866ff235b9bb28bbdee4ffe5e3a0f4394668aa6de9ef8c779cfca48

  • Size

    260KB

  • Sample

    240506-p1gvdafc56

  • MD5

    169ad47baa298cb8cadd64a54a3e3bb2

  • SHA1

    9ced7724ff62eda4927322de1aafeba3e8c535db

  • SHA256

    50aab0a87866ff235b9bb28bbdee4ffe5e3a0f4394668aa6de9ef8c779cfca48

  • SHA512

    d2f99c1e34d753ee5ae819b1dedab08e852c6b7eea7ce88234f8cef7d91c5c0b414156db4574bab817a80592f18e1094e7410f63f76a2dd02e3115edba329861

  • SSDEEP

    3072:7I0qv0Gb384RJB3ZvxCZzsem/fOfhiSXBu9rj7dC14L20gbLzydr/U2WKoAXJ/UT:nqv0Gb3TJzyZiUS34yNUVKoq0

Malware Config

Extracted

Family

redline

Botnet

5345987420

C2

https://pastebin.com/raw/KE5Mft0T

Targets

    • Target

      50aab0a87866ff235b9bb28bbdee4ffe5e3a0f4394668aa6de9ef8c779cfca48

    • Size

      260KB

    • MD5

      169ad47baa298cb8cadd64a54a3e3bb2

    • SHA1

      9ced7724ff62eda4927322de1aafeba3e8c535db

    • SHA256

      50aab0a87866ff235b9bb28bbdee4ffe5e3a0f4394668aa6de9ef8c779cfca48

    • SHA512

      d2f99c1e34d753ee5ae819b1dedab08e852c6b7eea7ce88234f8cef7d91c5c0b414156db4574bab817a80592f18e1094e7410f63f76a2dd02e3115edba329861

    • SSDEEP

      3072:7I0qv0Gb384RJB3ZvxCZzsem/fOfhiSXBu9rj7dC14L20gbLzydr/U2WKoAXJ/UT:nqv0Gb3TJzyZiUS34yNUVKoq0

    • Detect ZGRat V1

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks