General

  • Target

    be3f82ed8f528e4c45a0c80390f6d97449592af559b9e0961427682dbbffd603

  • Size

    260KB

  • Sample

    240506-pc2vmsbc4y

  • MD5

    37088f94d2c94e755c357f3f9f552682

  • SHA1

    04786e703a95aa0c8a230ab535fc4c98f19b813e

  • SHA256

    be3f82ed8f528e4c45a0c80390f6d97449592af559b9e0961427682dbbffd603

  • SHA512

    7ae3dc4ef91863a3ce2863efe23396761c0960596fce9220265f1e280b475b2f21620a913b616b8df65e9480e8d76790bcda40262125c19089b1b7a4ddbf3841

  • SSDEEP

    3072:vI0qv0jb394UJB3ZG6eIMsd0QM4DZhrdBmG55l/XWoG4aiLfxxCoZn/UxF:Lqv0jb3JJzZXDfmWVXewLZxCB

Malware Config

Extracted

Family

redline

Botnet

5345987420

C2

https://pastebin.com/raw/KE5Mft0T

Targets

    • Target

      be3f82ed8f528e4c45a0c80390f6d97449592af559b9e0961427682dbbffd603

    • Size

      260KB

    • MD5

      37088f94d2c94e755c357f3f9f552682

    • SHA1

      04786e703a95aa0c8a230ab535fc4c98f19b813e

    • SHA256

      be3f82ed8f528e4c45a0c80390f6d97449592af559b9e0961427682dbbffd603

    • SHA512

      7ae3dc4ef91863a3ce2863efe23396761c0960596fce9220265f1e280b475b2f21620a913b616b8df65e9480e8d76790bcda40262125c19089b1b7a4ddbf3841

    • SSDEEP

      3072:vI0qv0jb394UJB3ZG6eIMsd0QM4DZhrdBmG55l/XWoG4aiLfxxCoZn/UxF:Lqv0jb3JJzZXDfmWVXewLZxCB

    • Detect ZGRat V1

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks