General

  • Target

    d218ec1d109761b6ac50f96884a54966ff2f34fc6fc3dd278a52408249a2e0cb

  • Size

    1.6MB

  • Sample

    241119-h4dhsswrbj

  • MD5

    8f39174f8fb3a58a0711cb394092c090

  • SHA1

    9f9d55449b0758fe239793595ca190e9f36b9bf8

  • SHA256

    d218ec1d109761b6ac50f96884a54966ff2f34fc6fc3dd278a52408249a2e0cb

  • SHA512

    fe53e444ae62a5c22656de51fc6fb54aebab33b1ca3418485f61498358f933c2d7ddef7c6d7b3675869022ad95cfbf1612cfe3ccfd7fe84d2103ce564a1efec1

  • SSDEEP

    24576:Btb20pdaCqT5TBWgNQ7aOAWjMOxsRn2DZv86ArsqjnhMgeiCl7G0nehbGZpbD:Syg5tQ7aOA4Mlk65fDmg27RnWGj

Malware Config

Extracted

Family

redline

Botnet

FOZ

C2

212.162.149.53:36014

Targets

    • Target

      d218ec1d109761b6ac50f96884a54966ff2f34fc6fc3dd278a52408249a2e0cb

    • Size

      1.6MB

    • MD5

      8f39174f8fb3a58a0711cb394092c090

    • SHA1

      9f9d55449b0758fe239793595ca190e9f36b9bf8

    • SHA256

      d218ec1d109761b6ac50f96884a54966ff2f34fc6fc3dd278a52408249a2e0cb

    • SHA512

      fe53e444ae62a5c22656de51fc6fb54aebab33b1ca3418485f61498358f933c2d7ddef7c6d7b3675869022ad95cfbf1612cfe3ccfd7fe84d2103ce564a1efec1

    • SSDEEP

      24576:Btb20pdaCqT5TBWgNQ7aOAWjMOxsRn2DZv86ArsqjnhMgeiCl7G0nehbGZpbD:Syg5tQ7aOA4Mlk65fDmg27RnWGj

    • Detect Xworm Payload

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks