General

  • Target

    c9ca226a2016cda8abc17a88256b09b8.bin

  • Size

    259KB

  • Sample

    230513-b5hetafb27

  • MD5

    bde0be72ce6eb144b5bb68e8846e6d15

  • SHA1

    82b41eba78a91086d91e0492d94a756ee1154df6

  • SHA256

    890aed15049b649c4d39e64c5331d0612c529cfab7009b3db8f0f197fc7c94a4

  • SHA512

    613c380839ffcc6c47cbade9f8a9d5bffbed31450538f21e31d8ff9ba13fab68df9bd39a1d559fee6c4c544fae06effdaed09b9c00d5285a9ecdf0b7120d400d

  • SSDEEP

    6144:AxNBasrjp8N1GxINnVOIzA3qv1fJRyGiINotrASSIH:2NB/rjp01npE3qv3QGXCifIH

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

178.33.182.70:18918

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Targets

    • Target

      8a47d16dd380f046459e2fd1ebc636a1bba301d521587cc147b4240de545b20e.exe

    • Size

      397KB

    • MD5

      c9ca226a2016cda8abc17a88256b09b8

    • SHA1

      8d9e5449790924430e6c0de8232e46fa97b1dae6

    • SHA256

      8a47d16dd380f046459e2fd1ebc636a1bba301d521587cc147b4240de545b20e

    • SHA512

      44005217e202fac280d9c3a6a7e63f99bde6a836d29e560143893a7de5f5ff9c516c9aba6ae9af6b27e862a87048259708b8a986a142d35e29a34d5e6937bfe1

    • SSDEEP

      6144:6FMJQLLzvijefEGxpUowDUefSHnmqVWRVUAAx2iJLBITOCB8MQhw:6z3zviaEgOowkmqgMLBITTl

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks