Resubmissions

09-05-2024 18:25

240509-w2nsmsbc56 10

09-05-2024 08:53

240509-ks9szahf2w 10

09-05-2024 08:52

240509-ks3pnace25 1

08-05-2024 09:27

240508-le3m6sdf7t 10

07-05-2024 10:53

240507-my8tzach4v 5

05-05-2024 15:20

240505-sqqlbadg5s 5

04-05-2024 12:20

240504-phv92sgf24 10

04-05-2024 12:17

240504-pf52gage49 10

03-05-2024 11:11

240503-naq5pafb29 10

30-04-2024 17:26

240430-v1anysbf4y 7

General

  • Target

    https://github.com

  • Sample

    240509-ks9szahf2w

Malware Config

Extracted

Family

redline

Botnet

Github_Crypted

C2

20.100.11.101:42074

Targets

    • Detect ZGRat V1

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks