General

  • Target

    d11e4a59082d53abad2766a4c7da2c83.bin

  • Size

    1.8MB

  • Sample

    230328-cwsd4aad41

  • MD5

    86ee4ef0582fd7f23e1e1cdfc87f0661

  • SHA1

    a2da13c7f86732d3cba9e72bf6dc24b83a695005

  • SHA256

    46cc4ae74168aa070c0a88b89c1adc677a6f9bde89b1cb4a4dab5633839cf9ac

  • SHA512

    567abd778a315a2593785894e6ad7f670b1aed1bf32e3ab09919f34d72a2fdd3b0aa20d43fc7c1e7368a01d13dde6703c079a52eb4aa50c25be7cc956ccada96

  • SSDEEP

    49152:p5PuE2SAqCpvchhBVUHKmJ+abMDKbLdrb675mue8m2:pduE2hLcHBCHsabMKb67k4

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

51.210.161.21:36108

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Targets

    • Target

      cd7d654995db0f917d4c7d694c4ec2698eb47ee8702774ed3d9f0603cae3f8e4.exe

    • Size

      1.9MB

    • MD5

      d11e4a59082d53abad2766a4c7da2c83

    • SHA1

      e4959411b51690dbda4b9132a41e564521491b76

    • SHA256

      cd7d654995db0f917d4c7d694c4ec2698eb47ee8702774ed3d9f0603cae3f8e4

    • SHA512

      23cc4bbe50668fcfcc0ccb6b2cf0f6a710a0e7d4cf53c256410b585c42bbd172ad06653393b7986afbb850fd0d34cdccd91810b7582b9c6081166aa933d970cf

    • SSDEEP

      49152:V5O+qBxAR65Lnt4ZPmN24wBU/VWGOVblDNZhd:V5CBxARCWG0blThd

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks