General

  • Target

    041cc88cbceb864768d4d0ede0c0f88a.exe

  • Size

    402KB

  • Sample

    230629-l7xydsde7v

  • MD5

    041cc88cbceb864768d4d0ede0c0f88a

  • SHA1

    814193713ef7b93b57e7141d86c7aa38a8999c76

  • SHA256

    f21c09195ba116e3f43f163fc8132c957d6aba102df96f7822ac9558dd6d279e

  • SHA512

    9710d6539a3fd764f05b6bf0b1abe106ffa8857c0185e24cbdd9c27908cb5709ceee15fef4704d6e48b50b049c95086ac50fc4e81de51dcd2cc9552184993409

  • SSDEEP

    6144:uDRIz77bNZ2LTDYhDNKUa8r5iZ5EPXx3Y+yUDYeG:uDRy7bNZoYhhKaiZ5YXx31Y

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

146.59.161.7:36019

Attributes
  • auth_value

    3b673ed7d249dbe9bfb73dba76d130a2

Targets

    • Target

      041cc88cbceb864768d4d0ede0c0f88a.exe

    • Size

      402KB

    • MD5

      041cc88cbceb864768d4d0ede0c0f88a

    • SHA1

      814193713ef7b93b57e7141d86c7aa38a8999c76

    • SHA256

      f21c09195ba116e3f43f163fc8132c957d6aba102df96f7822ac9558dd6d279e

    • SHA512

      9710d6539a3fd764f05b6bf0b1abe106ffa8857c0185e24cbdd9c27908cb5709ceee15fef4704d6e48b50b049c95086ac50fc4e81de51dcd2cc9552184993409

    • SSDEEP

      6144:uDRIz77bNZ2LTDYhDNKUa8r5iZ5EPXx3Y+yUDYeG:uDRy7bNZoYhhKaiZ5YXx31Y

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks