General

  • Target

    xxSMTPxx.rar

  • Size

    4.4MB

  • Sample

    241204-n782rszmhq

  • MD5

    8bbf7b847e7d9186ddff364f38d96dd2

  • SHA1

    65dbe43eb900f655b36cbb8922bd0263effccbd0

  • SHA256

    966f1a3f09434d129c3601f3e1f76c8a941e70a6e07186841fd4142b0d13de5a

  • SHA512

    11ad338fdb66f88c8512fe2fd6092b8acd8fbdb90634e4d56034198140ced1b63c8bea2fd494baee837e33def7eb244e06109170b7523b594b9fb826279978f2

  • SSDEEP

    98304:7C62cIMiyiHXkF6k6OtvK0O4gQJgs/wo6w:7rzIMid3kFp6b0ZgQy0woB

Malware Config

Extracted

Family

redline

Botnet

noname

C2

148.163.89.57:42212

Targets

    • Target

      xxSMTPxx.rar

    • Size

      4.4MB

    • MD5

      8bbf7b847e7d9186ddff364f38d96dd2

    • SHA1

      65dbe43eb900f655b36cbb8922bd0263effccbd0

    • SHA256

      966f1a3f09434d129c3601f3e1f76c8a941e70a6e07186841fd4142b0d13de5a

    • SHA512

      11ad338fdb66f88c8512fe2fd6092b8acd8fbdb90634e4d56034198140ced1b63c8bea2fd494baee837e33def7eb244e06109170b7523b594b9fb826279978f2

    • SSDEEP

      98304:7C62cIMiyiHXkF6k6OtvK0O4gQJgs/wo6w:7rzIMid3kFp6b0ZgQy0woB

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • UAC bypass

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • Target

      xxSMTPxx/Private Cracker/xxSMTPxx.EXE

    • Size

      4.6MB

    • MD5

      9088655d2558fc34338e8b06e98cd403

    • SHA1

      cfeb0f3d288ead6c9fd0aaa4e05dd53127696c22

    • SHA256

      3e44ce378be97fc687a392f97abfe6ee0f9e4b1c15d88347668d7c384f7024ac

    • SHA512

      49a8cccf8a8801c946fba88a0e6a68f19443dc5e5e01f9d0d09e6bc9cf9bc41932c939e975d63167adb6e73b62f2235fe3dd07dafbb6220467427eacede268a0

    • SSDEEP

      98304:il9Goe+rmZQHPN6zkioyxx8zhSGw0g61nWYK6wgPI3:ils9+ro+N9DSTmnWYK6wYI

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • UAC bypass

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks