General

  • Target

    1084-56-0x00000000025C0000-0x00000000025F4000-memory.dmp

  • Size

    208KB

  • Sample

    230519-l3h9fadc27

  • MD5

    3aafefdd3deb3d1f6248df0e5811bab6

  • SHA1

    1dca95368e31727b0cd374f4e06769ec868c8ed7

  • SHA256

    19e92910c66f6eede2edbacd7825965f0cee8d9367e27401e4972df6e62e0df5

  • SHA512

    131c928636e9a65afbaca17826630e3fc3472d4651e3b6b7eef00593e5695e264c94f1c472b532a0b6905a1346baab29597c82207ee9a54af6cb73629fc99a00

  • SSDEEP

    3072:gzPLRuCkCBrrAuHOOxaCEflJhL+4FBKf8X3iL8e8hi:EPLRwCw+EflJh+1kX3iL

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

178.33.182.70:18918

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Targets

    • Target

      1084-56-0x00000000025C0000-0x00000000025F4000-memory.dmp

    • Size

      208KB

    • MD5

      3aafefdd3deb3d1f6248df0e5811bab6

    • SHA1

      1dca95368e31727b0cd374f4e06769ec868c8ed7

    • SHA256

      19e92910c66f6eede2edbacd7825965f0cee8d9367e27401e4972df6e62e0df5

    • SHA512

      131c928636e9a65afbaca17826630e3fc3472d4651e3b6b7eef00593e5695e264c94f1c472b532a0b6905a1346baab29597c82207ee9a54af6cb73629fc99a00

    • SSDEEP

      3072:gzPLRuCkCBrrAuHOOxaCEflJhL+4FBKf8X3iL8e8hi:EPLRwCw+EflJh+1kX3iL

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

MITRE ATT&CK Matrix

Tasks