General

  • Target

    1b092c17d5f337e854e6ec448.bin

  • Size

    218KB

  • Sample

    230704-n4l3tscc83

  • MD5

    cd48cbd191c44a4c064f89128b375d7c

  • SHA1

    8284328c6001e9f8e2aa5c9089b8839bab2bfda1

  • SHA256

    3b764000a39b2a85e8150bd01353e89a57cec2917ab07dacbf20efd6f16e9c0b

  • SHA512

    d266bc1c540df8d395fb9367d89f45b24505d093fa8622712b86cbf0199edaa08effd74a41a140e3baefad79f8a78835b7cba0d972cd5c0a89e9b06ad0a29e96

  • SSDEEP

    6144:BqbR3twXc+slE2Yc4R+FzRH2cvIpZH7HLy0RNTT0kbJkyiE:Q3twXjs+3cQ+/H2cWDmIT0kbJxiE

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

146.59.161.7:48080

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Targets

    • Target

      6d6be71b6cdc81a5dfe0ac14628657edbd3e2b3b4255d2d7848cfd8c1ffbf984.exe

    • Size

      277KB

    • MD5

      1b092c17d5f337e854e6ec4486edfa15

    • SHA1

      81fe445b6571f629741c410199b396797a0a5305

    • SHA256

      6d6be71b6cdc81a5dfe0ac14628657edbd3e2b3b4255d2d7848cfd8c1ffbf984

    • SHA512

      75330553c63b759cedf6d86fada690b9014b97e5cb3a5ad2e33b26617c81eaf63b2ed7979d94cd1f6c7107085054b554cc3886beb0301c902eef73e5e23c05de

    • SSDEEP

      3072:uF7UL9btw2736ln3CFqvJph0oCG2L9QyJwrZRufXmaot2rI3Ivdv9pD5l8H4ypnE:awL9byQ36ZRvJH0B5L+yjEYvdVp8TnE

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks