General
-
Target
HQ Proxy Leecher.exe
-
Size
1.5MB
-
Sample
241013-nldzhayfmm
-
MD5
ad05fa68000e0eeb85b3c3835242d299
-
SHA1
685fd3ef6dff3cb3d1e1f57f72fca1393a2760d5
-
SHA256
038cb8f58a22bdc12db7cc312b6873e0502b07091b61d8168631222b3c378eec
-
SHA512
ad89c2ca8b2bcddd575e7fd4dd645ef22596a5053566d8664f1ec10df4a0e59194c7c32e78c1b7c90f9aae9212da724a327c9291e4365be6da33997ec261e249
-
SSDEEP
24576:ZK9PkeFizFAxaXOR/l4dUGVPlRhlIv/47UqlRhlIv/47U:81jYzYaeR/l4+GJn8A7Uyn8A7U
Static task
static1
Behavioral task
behavioral1
Sample
HQ Proxy Leecher.exe
Resource
win11-20241007-en
Malware Config
Extracted
redline
Diamotrix
176.111.174.140:1912
Extracted
asyncrat
0.5.8
Default
176.111.174.140:6606
176.111.174.140:7707
176.111.174.140:8808
oTA1Qk0GTnww
-
delay
3
-
install
true
-
install_file
svchost.exe
-
install_folder
%Temp%
Targets
-
-
Target
HQ Proxy Leecher.exe
-
Size
1.5MB
-
MD5
ad05fa68000e0eeb85b3c3835242d299
-
SHA1
685fd3ef6dff3cb3d1e1f57f72fca1393a2760d5
-
SHA256
038cb8f58a22bdc12db7cc312b6873e0502b07091b61d8168631222b3c378eec
-
SHA512
ad89c2ca8b2bcddd575e7fd4dd645ef22596a5053566d8664f1ec10df4a0e59194c7c32e78c1b7c90f9aae9212da724a327c9291e4365be6da33997ec261e249
-
SSDEEP
24576:ZK9PkeFizFAxaXOR/l4dUGVPlRhlIv/47UqlRhlIv/47U:81jYzYaeR/l4+GJn8A7Uyn8A7U
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Async RAT payload
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2