General

  • Target

    Ехternаl.zip

  • Size

    310KB

  • Sample

    240824-pnjs7szdqd

  • MD5

    e038e740aeb263c6d36db05f0d3b9068

  • SHA1

    15f0a6c403b0253f1f664a306e6bc8a2aa5088ff

  • SHA256

    979decdb0899c752e241420fc656ae4fd0b16f959981068d7ab484045832d78e

  • SHA512

    e4eec920dd51de00c961c2307ea9dbf5dba59ef476b027b40f9158a49f453cbdee183b3d6b25554db1e82bbedffe55bb6f56ea5b49ec35ac5dc8ac396db91092

  • SSDEEP

    6144:9fiTAYgxcpZy/bIaFei0/f8LYRNkaFOh0gqJqyqymIhGJ2+J1qBcqQrSenfYJ:B5szYZNhAOh2JqghGJVJ1qBkGe+

Malware Config

Extracted

Family

redline

Botnet

@exelzt

C2

185.215.113.22:80

Targets

    • Target

      Ехternаl 2.4.exe

    • Size

      313KB

    • MD5

      01c7563d3be6f0913926d08fa65ff7d7

    • SHA1

      60575b45e7bdfa5c8cb9d3c0e07a854cffb2d1bd

    • SHA256

      fa42848040ec7b89414e7d85211aabd15f9654a9006d0507c4e52fea7284029b

    • SHA512

      e3f05f5a4179c7e98c3309e18b18285be0b38943a4989e53307bf6b203d5d682bf89eef1e04815bc6930d21b5e1a96f88235e2486288af1e0933aaeb0b5ad2ba

    • SSDEEP

      6144:dDhpzkHxcpBy/bIaFeQ0/f8LYDNkaFOh08qJquqygIhGN2+J1qBcuzIjc:d/wqHY5NpAOhIJqghGNVJ1qBKjc

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks