General

  • Target

    54601d45a229469f2909404bc448ce2fcb6d90319d7b62adcbb36d48560b3500

  • Size

    1.1MB

  • Sample

    241022-wnk5lazejq

  • MD5

    db2082d65265145d992f05920fcaf442

  • SHA1

    84edb3496b2bb8db9fab5dbfaa388724aa3b2214

  • SHA256

    54601d45a229469f2909404bc448ce2fcb6d90319d7b62adcbb36d48560b3500

  • SHA512

    55b05af2666a47d7728e90c0bacdeef50d1401ef423d63ecf20c0400a6a82f86004f1af166857684a097e0c960a9ba1d18ef86144ed8d2bdf98b477bfcc08ebf

  • SSDEEP

    24576:pAT8QE+kiVNpJc7YMQGOna45spYKQMtQY/IYHiQqA245zVYjqGSQy:pAI+XNpJc7YMVItmftJ/UQ12qG5SQy

Malware Config

Extracted

Family

redline

Botnet

nam3

C2

103.89.90.61:34589

Attributes
  • auth_value

    64b900120bbceaa6a9c60e9079492895

Extracted

Family

vidar

Version

53.8

Botnet

1571

C2

https://t.me/spmhaus

https://c.im/@tiagoa33

Attributes
  • profile_id

    1571

Extracted

Family

redline

Botnet

5

C2

176.113.115.146:9582

Attributes
  • auth_value

    d38b30c1ccd6c1e5088d9e5bd9e51b0f

Extracted

Family

vidar

Version

53.8

Botnet

1521

C2

http://62.204.41.126:80

Attributes
  • profile_id

    1521

Extracted

Family

raccoon

Botnet

afb5c633c4650f69312baef49db9dfa4

C2

http://193.56.146.177

Attributes
  • user_agent

    mozzzzzzzzzzz

xor.plain

Extracted

Family

raccoon

Botnet

76426c3f362f5a47a469f0e9d8bc3eef

C2

http://45.95.11.158/

Attributes
  • user_agent

    mozzzzzzzzzzz

xor.plain

Targets

    • Target

      54601d45a229469f2909404bc448ce2fcb6d90319d7b62adcbb36d48560b3500

    • Size

      1.1MB

    • MD5

      db2082d65265145d992f05920fcaf442

    • SHA1

      84edb3496b2bb8db9fab5dbfaa388724aa3b2214

    • SHA256

      54601d45a229469f2909404bc448ce2fcb6d90319d7b62adcbb36d48560b3500

    • SHA512

      55b05af2666a47d7728e90c0bacdeef50d1401ef423d63ecf20c0400a6a82f86004f1af166857684a097e0c960a9ba1d18ef86144ed8d2bdf98b477bfcc08ebf

    • SSDEEP

      24576:pAT8QE+kiVNpJc7YMQGOna45spYKQMtQY/IYHiQqA245zVYjqGSQy:pAI+XNpJc7YMVItmftJ/UQ12qG5SQy

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks