General

  • Target

    https://www.youtube.com/redirect?event=backstage_event&redir_token=QUFFLUhqa3p0UnBhem8xT2VqWHpOcGw1Tjk4MHNSOHRtd3xBQ3Jtc0trSHRXWVZzeDQxMXNqMEtrUnZ5UzZ0X0FCWXE1UHl1bkd5MGZRQnd0TEdnTDRJT01JQ0k4bGdjTWFMVzRuZWVXSzYtcHFkRWN2VDBNQjZ6amFzdUxxT2R5MW1HRjF4MEE0N1lmQ0VsNXdYNTJMaEZabw&q=https%3A%2F%2Fsites.google.com%2Fview%2Famamsoft%3Fusp%3Dsharing

  • Sample

    240628-dhdt8azhjp

Malware Config

Extracted

Family

redline

Botnet

@NoNamePUK

C2

94.228.166.68:80

Targets

    • Target

      https://www.youtube.com/redirect?event=backstage_event&redir_token=QUFFLUhqa3p0UnBhem8xT2VqWHpOcGw1Tjk4MHNSOHRtd3xBQ3Jtc0trSHRXWVZzeDQxMXNqMEtrUnZ5UzZ0X0FCWXE1UHl1bkd5MGZRQnd0TEdnTDRJT01JQ0k4bGdjTWFMVzRuZWVXSzYtcHFkRWN2VDBNQjZ6amFzdUxxT2R5MW1HRjF4MEE0N1lmQ0VsNXdYNTJMaEZabw&q=https%3A%2F%2Fsites.google.com%2Fview%2Famamsoft%3Fusp%3Dsharing

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks