General

  • Target

    BruteCrack-Cracked.exe

  • Size

    1.7MB

  • Sample

    241119-jl8rna1hnf

  • MD5

    988472afd02ee8e165c3d4ed5aea3ffc

  • SHA1

    1926d346d3f061fbe92c166a56ef2a94492bd67d

  • SHA256

    3c3bc6b7bca65947ba821c3ab48ebc1f94dfd8941b96ed142936297b30dc9c1e

  • SHA512

    5bcb4e79bd2794342999ced9afcb111e9584d18c8a86026b74bf70231d393eba7650b15330403daaea4fa7d6ad245bea1669cc457a257134d8ae9aebc864f308

  • SSDEEP

    12288:l428z4GGOqQ1N8tMYXV6XiFoeBHgo2aFxvx9besho6Var0NS4aV2eAA9Xpwvbes4:q2800wVlBAxajnvJs0s4ZNvv0vht

Malware Config

Extracted

Family

redline

Botnet

Diamotrix

C2

176.111.174.140:1912

Targets

    • Target

      BruteCrack-Cracked.exe

    • Size

      1.7MB

    • MD5

      988472afd02ee8e165c3d4ed5aea3ffc

    • SHA1

      1926d346d3f061fbe92c166a56ef2a94492bd67d

    • SHA256

      3c3bc6b7bca65947ba821c3ab48ebc1f94dfd8941b96ed142936297b30dc9c1e

    • SHA512

      5bcb4e79bd2794342999ced9afcb111e9584d18c8a86026b74bf70231d393eba7650b15330403daaea4fa7d6ad245bea1669cc457a257134d8ae9aebc864f308

    • SSDEEP

      12288:l428z4GGOqQ1N8tMYXV6XiFoeBHgo2aFxvx9besho6Var0NS4aV2eAA9Xpwvbes4:q2800wVlBAxajnvJs0s4ZNvv0vht

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks