General

  • Target

    Netflix Checker v0.2.2.rar

  • Size

    127KB

  • Sample

    241206-se329sypaj

  • MD5

    43db5cdaa1fb1f396dcb95d3e0c94631

  • SHA1

    3e537a84cfdd59080d5adad6a671e3ada1f2ce24

  • SHA256

    8d17ffff67960e33b37d30c33fc83656a914111c09cfdf6c6faafe528e53ca28

  • SHA512

    f3956cfcf7cafa806989329928044481d3276539914033e07ed74e08434405f485bb38031d6cf21d3359dc2fafca9cc56802a89c86123a0e671af8c8ad40d030

  • SSDEEP

    3072:O+TgyWyRfLEhDN8NKW53UgsRnv5jj1vooy4EjcYh/UuxCjk+7z:tWytwx+Nz3UgsRnhjhvoloYy3n7z

Malware Config

Extracted

Family

redline

Botnet

Diamotrix

C2

176.111.174.140:1912

Targets

    • Target

      Netflix Checker v0.2.2.rar

    • Size

      127KB

    • MD5

      43db5cdaa1fb1f396dcb95d3e0c94631

    • SHA1

      3e537a84cfdd59080d5adad6a671e3ada1f2ce24

    • SHA256

      8d17ffff67960e33b37d30c33fc83656a914111c09cfdf6c6faafe528e53ca28

    • SHA512

      f3956cfcf7cafa806989329928044481d3276539914033e07ed74e08434405f485bb38031d6cf21d3359dc2fafca9cc56802a89c86123a0e671af8c8ad40d030

    • SSDEEP

      3072:O+TgyWyRfLEhDN8NKW53UgsRnv5jj1vooy4EjcYh/UuxCjk+7z:tWytwx+Nz3UgsRnhjhvoloYy3n7z

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Downloads MZ/PE file

    • A potential corporate email address has been identified in the URL: [email protected]

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks