General

  • Target

    em_Kia5weA1_installer_Win7-Win11_x86_x64.msi

  • Size

    93.9MB

  • Sample

    240622-s6gncasglf

  • MD5

    a295cf96ebabdfa1d30424e72ed6d4df

  • SHA1

    7d5fb6b88051115b59f47dadb49ea8114cdf5c4b

  • SHA256

    f4d1b970bc9e5d319c5432be9e3863b5a20bf26e557c8cea6f3949df0012cf01

  • SHA512

    b098929b66bdfa26e26e7965f6166cc5f008d09bf913d172c84aed2b631b9b6a2aa71739d36705509343d644c69b71d91dfd9ccabc948b858377ebe5a36d80e9

  • SSDEEP

    1572864:ofSCYWHh+jXJ16YaOPnGJ52t8/MdYs3iR7cGY+v5mK//pHKH3LgjmWDCZT3V5cR+:kSC/B+7L68nGJ5GLdn3Mh/pHeUj7DCpt

Malware Config

Extracted

Family

redline

Botnet

@DolphinLoader_Bot

C2

157.90.5.250:18637

Targets

    • Target

      em_Kia5weA1_installer_Win7-Win11_x86_x64.msi

    • Size

      93.9MB

    • MD5

      a295cf96ebabdfa1d30424e72ed6d4df

    • SHA1

      7d5fb6b88051115b59f47dadb49ea8114cdf5c4b

    • SHA256

      f4d1b970bc9e5d319c5432be9e3863b5a20bf26e557c8cea6f3949df0012cf01

    • SHA512

      b098929b66bdfa26e26e7965f6166cc5f008d09bf913d172c84aed2b631b9b6a2aa71739d36705509343d644c69b71d91dfd9ccabc948b858377ebe5a36d80e9

    • SSDEEP

      1572864:ofSCYWHh+jXJ16YaOPnGJ52t8/MdYs3iR7cGY+v5mK//pHKH3LgjmWDCZT3V5cR+:kSC/B+7L68nGJ5GLdn3Mh/pHeUj7DCpt

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Checks for any installed AV software in registry

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks