General

  • Target

    2820-57-0x0000000002000000-0x0000000002034000-memory.dmp

  • Size

    208KB

  • Sample

    230708-qy67xsfg8s

  • MD5

    d10bdf7d008a42d1f965e9e7ea32b43c

  • SHA1

    e3c631f6f5ca571b07b45d9490c6de05d1a61e63

  • SHA256

    3e11bfebd2078887c4430fbdfafc920e191770e7cc19dc8e3157d401937dc88c

  • SHA512

    3495186b1fca9537031ff7576d2f8d3a2454f42fcef447a8b0c7ccd626cb845539706873e9c22d10e37970dd49ccc9b19989b44d9bc6f8aa6396782e39f2c814

  • SSDEEP

    3072:d8S4s69gQu2l1/+lEH52BIPUVQ+RwM+IB+SaDtsA4+rSzPDJ8e8h0:KS4s6Pl1/jUhtcSMtsASR

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

146.59.161.7:48080

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Targets

    • Target

      2820-57-0x0000000002000000-0x0000000002034000-memory.dmp

    • Size

      208KB

    • MD5

      d10bdf7d008a42d1f965e9e7ea32b43c

    • SHA1

      e3c631f6f5ca571b07b45d9490c6de05d1a61e63

    • SHA256

      3e11bfebd2078887c4430fbdfafc920e191770e7cc19dc8e3157d401937dc88c

    • SHA512

      3495186b1fca9537031ff7576d2f8d3a2454f42fcef447a8b0c7ccd626cb845539706873e9c22d10e37970dd49ccc9b19989b44d9bc6f8aa6396782e39f2c814

    • SSDEEP

      3072:d8S4s69gQu2l1/+lEH52BIPUVQ+RwM+IB+SaDtsA4+rSzPDJ8e8h0:KS4s6Pl1/jUhtcSMtsASR

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks