General

  • Target

    719082dcc3c017e5b675c8b9ec74b6a1.exe

  • Size

    1.2MB

  • Sample

    230324-hj7wxacg45

  • MD5

    719082dcc3c017e5b675c8b9ec74b6a1

  • SHA1

    d189e585b338d3ce5d6f0c04e0ce94aa40343c6a

  • SHA256

    6a57409b5f4d0ae13167353c059ddf4b9fe7920647a119a70438dae02a35586e

  • SHA512

    c72824357f2527917e26dc73d979672299e165b15d3114da66f0fbd4448129cc48487f3079a056af244d5685e847ff9f1e684341c243c7f14572d5ac0626fea5

  • SSDEEP

    24576:kTbBv5rUlINj1z+EmdKiTazGSfcElXv8zcAsMVMgSZwU:WBREd3GGSfNpAjpS

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

51.210.161.21:36108

Attributes
  • auth_value

    3a050df92d0cf082b2cdaf87863616be

Targets

    • Target

      719082dcc3c017e5b675c8b9ec74b6a1.exe

    • Size

      1.2MB

    • MD5

      719082dcc3c017e5b675c8b9ec74b6a1

    • SHA1

      d189e585b338d3ce5d6f0c04e0ce94aa40343c6a

    • SHA256

      6a57409b5f4d0ae13167353c059ddf4b9fe7920647a119a70438dae02a35586e

    • SHA512

      c72824357f2527917e26dc73d979672299e165b15d3114da66f0fbd4448129cc48487f3079a056af244d5685e847ff9f1e684341c243c7f14572d5ac0626fea5

    • SSDEEP

      24576:kTbBv5rUlINj1z+EmdKiTazGSfcElXv8zcAsMVMgSZwU:WBREd3GGSfNpAjpS

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks