General

  • Target

    b402bc88622f32efecb63d8ff1676cd4621d0d4752b3749a37d0e855480ef4d1.exe

  • Size

    260KB

  • Sample

    240507-b2ejracf3y

  • MD5

    897fd3f2dcaa979302a91993d49b946b

  • SHA1

    64c64ce4139a0579a24a53712b8bc92d44d50038

  • SHA256

    b402bc88622f32efecb63d8ff1676cd4621d0d4752b3749a37d0e855480ef4d1

  • SHA512

    1ac5ff59c0233e1f5fde41d12719f2763f7d10ed2da66e2180e021f6963ad2640c2a9d33294769b03fa9094aab4591bf89728250e969e793a73aec75505718cd

  • SSDEEP

    6144:rqv0lBhwYNI2gb37JzcV1xZZnjdKrHrczHlw6YB43+v:mb3hcV1xjJSHQzHlPS43+

Malware Config

Extracted

Family

redline

Botnet

5637482599

C2

https://pastebin.com/raw/NgsUAPya

Targets

    • Target

      b402bc88622f32efecb63d8ff1676cd4621d0d4752b3749a37d0e855480ef4d1.exe

    • Size

      260KB

    • MD5

      897fd3f2dcaa979302a91993d49b946b

    • SHA1

      64c64ce4139a0579a24a53712b8bc92d44d50038

    • SHA256

      b402bc88622f32efecb63d8ff1676cd4621d0d4752b3749a37d0e855480ef4d1

    • SHA512

      1ac5ff59c0233e1f5fde41d12719f2763f7d10ed2da66e2180e021f6963ad2640c2a9d33294769b03fa9094aab4591bf89728250e969e793a73aec75505718cd

    • SSDEEP

      6144:rqv0lBhwYNI2gb37JzcV1xZZnjdKrHrczHlw6YB43+v:mb3hcV1xjJSHQzHlPS43+

    • Detect ZGRat V1

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks