General

  • Target

    file.exe

  • Size

    347KB

  • Sample

    230703-naa4gagb75

  • MD5

    b4e676bbca0000cfb22d1dc7546cc35c

  • SHA1

    55334b6eb0a6708f8b088003a392ae7ac9744ac0

  • SHA256

    eb5bd3825785063d9fda32333f634734a8a4a38be91bcff54337d4fa86e732d9

  • SHA512

    7e10f54c7fa3fe8f336a21e0e2b624f974640736da3e0d71abcbb46b31c585cd3c5004ac3a88d1a711cb6a2e8c17e92956ea850273f7d8ec87f1410dbb511a2f

  • SSDEEP

    3072:vPkhfwlvtgS/+9JlIDNB+ZAhdJ4RDWW2Ma78MZdHBlqnUSoyKAFO5WyyMW0K7FDZ:0TS/+9rCyR+N7XHBlqnxVO5WNfDV1D

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

146.59.161.7:48080

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Targets

    • Target

      file.exe

    • Size

      347KB

    • MD5

      b4e676bbca0000cfb22d1dc7546cc35c

    • SHA1

      55334b6eb0a6708f8b088003a392ae7ac9744ac0

    • SHA256

      eb5bd3825785063d9fda32333f634734a8a4a38be91bcff54337d4fa86e732d9

    • SHA512

      7e10f54c7fa3fe8f336a21e0e2b624f974640736da3e0d71abcbb46b31c585cd3c5004ac3a88d1a711cb6a2e8c17e92956ea850273f7d8ec87f1410dbb511a2f

    • SSDEEP

      3072:vPkhfwlvtgS/+9JlIDNB+ZAhdJ4RDWW2Ma78MZdHBlqnUSoyKAFO5WyyMW0K7FDZ:0TS/+9rCyR+N7XHBlqnxVO5WNfDV1D

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks