General

  • Target

    76fe4f4c3d4cb8dc941017dc942c45ca5cf18138fb8960e4f3383ede0b29d600

  • Size

    260KB

  • Sample

    240506-qgqtlsfg92

  • MD5

    040cf9e542e109f557ee2373f885b15e

  • SHA1

    d3889f1dcec4d92f68ec74aea4b6d03048b9b779

  • SHA256

    76fe4f4c3d4cb8dc941017dc942c45ca5cf18138fb8960e4f3383ede0b29d600

  • SHA512

    185c68573f303b8aa700a179b5a6d0688da996a2532dc235ca77895391940c48d14533bdbd8ff3097e4e4fe25236bdf7a7d27b971946fcd9bf2efb8be94d1519

  • SSDEEP

    3072:jI0qv0kub3P4BJB3ZxC9UistsiKhQMDjYu9XTDuCCk7iVRiX83zE3REFlAYK/UxF:Pqv0/b3WJzihbDjt9D6CC0RkzGmFLj

Malware Config

Extracted

Family

redline

Botnet

708370717

C2

https://pastebin.com/raw/KE5Mft0T

Targets

    • Target

      76fe4f4c3d4cb8dc941017dc942c45ca5cf18138fb8960e4f3383ede0b29d600

    • Size

      260KB

    • MD5

      040cf9e542e109f557ee2373f885b15e

    • SHA1

      d3889f1dcec4d92f68ec74aea4b6d03048b9b779

    • SHA256

      76fe4f4c3d4cb8dc941017dc942c45ca5cf18138fb8960e4f3383ede0b29d600

    • SHA512

      185c68573f303b8aa700a179b5a6d0688da996a2532dc235ca77895391940c48d14533bdbd8ff3097e4e4fe25236bdf7a7d27b971946fcd9bf2efb8be94d1519

    • SSDEEP

      3072:jI0qv0kub3P4BJB3ZxC9UistsiKhQMDjYu9XTDuCCk7iVRiX83zE3REFlAYK/UxF:Pqv0/b3WJzihbDjt9D6CC0RkzGmFLj

    • Detect ZGRat V1

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks