General

  • Target

    5f46d71351eaa94763c589b62.bin

  • Size

    232KB

  • Sample

    230630-qvqe1aea8v

  • MD5

    10a72a8be16159c0924ff1bd459b4033

  • SHA1

    596ed8da5be4b4aa1f9b047feefb54dbc7d2f6e2

  • SHA256

    82184fe326360924e97f603427d1ec8c4b1f69e26afc860a177ba0f43d3a8ed8

  • SHA512

    6b8a3ff93c59053211a89729e7cabf104fa1cb9a966c3c2fe244d9869440e36ddc6e5bbca0818eb5efc301e3ebc0969f9f42a0d51e21031dc887af689eb92af1

  • SSDEEP

    3072:5vwKDBjw19kuBqwfV1B1D6zQfYwNgGQGodWjzZVOD0l+Vm+btR8LkhDIA9F8df6X:/uBqy1zffb5QzNm+btR8ohDFk2xRvfR

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

146.59.161.7:36019

Attributes
  • auth_value

    3b673ed7d249dbe9bfb73dba76d130a2

Targets

    • Target

      dc162f6994b714c3f26ce9f5a6490d7b395ffebfb01e1949720177c3af03d7ab.exe

    • Size

      350KB

    • MD5

      5f46d71351eaa94763c589b62e73591a

    • SHA1

      564fb229ba4d5c2a3f159c53b48ae088926e752b

    • SHA256

      dc162f6994b714c3f26ce9f5a6490d7b395ffebfb01e1949720177c3af03d7ab

    • SHA512

      fd21ab479f6d7ec5f8160e9cab9a7d6f78ceeed57259cab326d51ba23c5000cb103dc764891c68eae10f14fd9f5c956063028300cc56a98c10d9d27edd6f27ee

    • SSDEEP

      3072:2E1fl8vhjeB9DFaP4CSox5yUUSvT7bPU/bAEP3WLWlpPKWqx8wAw7qqRAV5jwSnb:FGUPDePmUrU/93WCXKWqx87FwgwSui

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks