General

  • Target

    file.exe

  • Size

    25KB

  • Sample

    241204-wpdrxatpht

  • MD5

    031377e4e34dcd19917fac02ff6da79f

  • SHA1

    0fcccffee83cbb77a87ca1b55abc8e18fb267afc

  • SHA256

    d58061a43df6b63e97421904c066ed5ad4b87a3733c250e105e83bc7154d9414

  • SHA512

    f682a314a74dad1269dc1d948dc0c4773eb08e76ab364c3d5a9893577395126e5a409fca18cab24378e95fa71b8d96e20ad22e644275daf3f997edf8592da5c4

  • SSDEEP

    384:jduHBY6QtYnfd6unCuUe1v5NFWJKtEBHx5fyf9SdsPDhxWBtIBLAKhm38fARlQWy:jduH/v1v5NxffIdIfDBtfARl/

Malware Config

Extracted

Family

redline

Botnet

Diamotrix

C2

176.111.174.140:1912

Targets

    • Target

      file.exe

    • Size

      25KB

    • MD5

      031377e4e34dcd19917fac02ff6da79f

    • SHA1

      0fcccffee83cbb77a87ca1b55abc8e18fb267afc

    • SHA256

      d58061a43df6b63e97421904c066ed5ad4b87a3733c250e105e83bc7154d9414

    • SHA512

      f682a314a74dad1269dc1d948dc0c4773eb08e76ab364c3d5a9893577395126e5a409fca18cab24378e95fa71b8d96e20ad22e644275daf3f997edf8592da5c4

    • SSDEEP

      384:jduHBY6QtYnfd6unCuUe1v5NFWJKtEBHx5fyf9SdsPDhxWBtIBLAKhm38fARlQWy:jduH/v1v5NxffIdIfDBtfARl/

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks