General

  • Target

    1.exeuleyreca

  • Size

    4.5MB

  • Sample

    220416-f54ehaehh9

  • MD5

    aa8c93ab20cfef18702def0d25f24e02

  • SHA1

    0c4e91e9ef40aeb853a114864bd6b32c58149244

  • SHA256

    a802666a7b608a22383ea018c727793e0541bbe57de2fd85d1214e2b91b1054c

  • SHA512

    281c9b6f37bc3e37aabef621c483ce523bff739e03a3cceb88c90738195872b5cda54e9f27f3f7b4023c6aa70a92ca38d59167a6078a7610401c97337895501b

Malware Config

Extracted

Family

redline

C2

104.244.76.137:4487

Attributes
  • auth_value

    67c42657a2dc51f3323efd90a04a2b03

Targets

    • Target

      1.exeuleyreca

    • Size

      4.5MB

    • MD5

      aa8c93ab20cfef18702def0d25f24e02

    • SHA1

      0c4e91e9ef40aeb853a114864bd6b32c58149244

    • SHA256

      a802666a7b608a22383ea018c727793e0541bbe57de2fd85d1214e2b91b1054c

    • SHA512

      281c9b6f37bc3e37aabef621c483ce523bff739e03a3cceb88c90738195872b5cda54e9f27f3f7b4023c6aa70a92ca38d59167a6078a7610401c97337895501b

    • PhoenixStealer

      PhoenixStealer is an information stealer written in the C++, it sends the stolen information to cybercriminals.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks