General

  • Target

    22.exe

  • Size

    2.3MB

  • Sample

    220416-f6gbcscacl

  • MD5

    11fdf8c21d2059cccce0645934e29943

  • SHA1

    77d4de585b06c62bc2ed71393cb2d6fec4bb464d

  • SHA256

    54f4ec503268ddc6c926d59ab37dadd1455c9cab3ba3947d1aa3c58fa6aca308

  • SHA512

    38238dbcd3cb5577753149311685d42d40dcee82b25158a9a8c7f5037186d5b68907fce4e24c64dc369465ac4390e503d48ad0ecf255200275c3de6a3549e665

Malware Config

Targets

    • Target

      22.exe

    • Size

      2.3MB

    • MD5

      11fdf8c21d2059cccce0645934e29943

    • SHA1

      77d4de585b06c62bc2ed71393cb2d6fec4bb464d

    • SHA256

      54f4ec503268ddc6c926d59ab37dadd1455c9cab3ba3947d1aa3c58fa6aca308

    • SHA512

      38238dbcd3cb5577753149311685d42d40dcee82b25158a9a8c7f5037186d5b68907fce4e24c64dc369465ac4390e503d48ad0ecf255200275c3de6a3549e665

    • PhoenixStealer

      PhoenixStealer is an information stealer written in the C++, it sends the stolen information to cybercriminals.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

3
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Tasks