General

  • Target

    031377e4e34dcd19917fac02ff6da79f.bin

  • Size

    9KB

  • Sample

    241206-bc1qpa1phx

  • MD5

    7de31cce4ae17656714fc1443ab3ebb9

  • SHA1

    94446a26abbfb9c03617c9da7df386d96bfac694

  • SHA256

    e282d28d4ff002d55ea89e7c09786436fa91da058b72ca9787192a9bb23bf838

  • SHA512

    e5cc10fa654e6017f6f3a5c66aac3727fafd884a724d2ac5b8a8cf237d4896ff11e61ec06501f0cc545fff8436fe0791f3bd70c868a20c52171f04e425209a22

  • SSDEEP

    192:6XpRU4tXAYJTc+JsJCGI+BgxBVaI7yZ2qRbTzXr57LYxLrz+eRsnCHIBxvYjvFD:6XQmXtcQsIbaUix7LQYCHIXQD

Malware Config

Extracted

Family

redline

Botnet

Diamotrix

C2

176.111.174.140:1912

Targets

    • Target

      d58061a43df6b63e97421904c066ed5ad4b87a3733c250e105e83bc7154d9414.exe

    • Size

      25KB

    • MD5

      031377e4e34dcd19917fac02ff6da79f

    • SHA1

      0fcccffee83cbb77a87ca1b55abc8e18fb267afc

    • SHA256

      d58061a43df6b63e97421904c066ed5ad4b87a3733c250e105e83bc7154d9414

    • SHA512

      f682a314a74dad1269dc1d948dc0c4773eb08e76ab364c3d5a9893577395126e5a409fca18cab24378e95fa71b8d96e20ad22e644275daf3f997edf8592da5c4

    • SSDEEP

      384:jduHBY6QtYnfd6unCuUe1v5NFWJKtEBHx5fyf9SdsPDhxWBtIBLAKhm38fARlQWy:jduH/v1v5NxffIdIfDBtfARl/

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks