General

  • Target

    d46878f2ad28df08972371a617bce73ae623523c

  • Size

    6.6MB

  • Sample

    241105-t14rcsxkcr

  • MD5

    be2277afa663a9d4083c5e08787fe8e9

  • SHA1

    3eda61a9a9a205e7bd64a6c6dccf836d91df6e6b

  • SHA256

    9f7b0e7b7254df1f1f723f5f048c7d5a864cbed4bb875732befd33ecda645e54

  • SHA512

    d575d391cccb1cc81bd5b0867120b16f5164d6c69c12c380d5281e9b26a2c75216b82b557ff86e283867430f5ccaeb07deebccf8851cffc58b30230037ae3a6a

  • SSDEEP

    98304:YJeVxLr7THzURg/FPzIKa+CqgX+i7p0kri5zeOTYzg4HPApkSVNzdgGESk0TEkLD:YQ9r7rzUl3/7HUjTYzNvApb5vdTEkLD

Malware Config

Extracted

Family

redline

Botnet

Notepad_2

C2

194.36.177.124:39456

Attributes
  • auth_value

    37464cc4dd294b9925a8c1092e1c72a9

Targets

    • Target

      DATA PROTECTION/combase.dll

    • Size

      2.1MB

    • MD5

      65441ddd17d8f99b37b9716412415940

    • SHA1

      23aaaec781f3f81bbb65470944c060e973b6e995

    • SHA256

      c5a6f11a839ad1e46983ddbef1f697e17e1f64ba80d388f6d7392461ddd90a9e

    • SHA512

      e04496ce8373021a586f31abffcbad46d159a3e70ac06c57416be7c413a7d7a93d12d7777e068a1575156699c2fd6ca1e53a40ba6d61f9137dfa62c720aacb69

    • SSDEEP

      49152:qYbdzuV9mMWdJKyzaBUPQ/MQ+emp+jhS6o:q8IydJzzgaX9p+u

    Score
    1/10
    • Target

      DATA PROTECTION/freebl3.dll

    • Size

      741KB

    • MD5

      f70594c50cfdddcb73690f9fa3d79f37

    • SHA1

      290157ea262756a5c9bafc8bbba46d6a9a0c9d10

    • SHA256

      8bb27eeb3481cf8e13d27c5599176e80976231d6b1b9c956af121740d3839858

    • SHA512

      3f6dc0582ec99d4d05ed6dbe47111e123858e404e3a78891c6593ce582578632cf717ce2cb4010297130fd0cdf297f7923429c37498945df765b51ec086dde14

    • SSDEEP

      12288:IP+3NkvK0MwtS2ZZELO173ycCZ0Kt3FjjwRwlbwgUfZmLqnhw:IPmkPMwtYLi7ycCZ0KNFjjwRwlcrfS+K

    Score
    1/10
    • Target

      npp.8.4.1.Installer.x64.exe

    • Size

      700.0MB

    • MD5

      9a2c573e882d31251e1bcd07ba90585f

    • SHA1

      d46878f2ad28df08972371a617bce73ae623523c

    • SHA256

      d7cd49477ad1b8c676dc3507372ca774a69af98280db45a1c9ad0c5f0a4c309e

    • SHA512

      40ac3d1cca6bb8eb7ccfb0d1ae0467423b0355ee5cded84b1095a284f08cecbd70325b808df933d47a7af60081470ad71ee1021e724759227379052302ff3894

    • SSDEEP

      98304:h9eCUTzzphq1G/jxZIo0YYUOJimJJQYts5JcyTcvg6BtufkCJ:PefTzVhqpP9JvgpTcvf7ufz

    • Detect PureCrypter injector

    • PureCrypter

      PureCrypter is a .NET malware loader first seen in early 2021.

    • Purecrypter family

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks