General

  • Target

    2240-57-0x0000000001F30000-0x0000000001F64000-memory.dmp

  • Size

    208KB

  • Sample

    230708-qygx2afg7z

  • MD5

    172a23d45b275cc281abe75813149975

  • SHA1

    62079f3573503b43baa807e2fa3562733d0933ca

  • SHA256

    d8032b8a39044fe439fa6d591fd1080beef8cfac2ca527953df68ec500109272

  • SHA512

    e448d59bddc84e8c485e6edf4d40942f533c102bce33b460436782de8f4535c9ca9abf4b2d8751a9c67cf8c63d92e570db158e89cc01713d03a768b09b661c89

  • SSDEEP

    3072:d8S4s69gQu2l1/+lEH52BIPUVQ+RwM+IB+SaDtsA4+rSzPDJ8e8h0:KS4s6Pl1/jUhtcSMtsASR

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

146.59.161.7:48080

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Targets

    • Target

      2240-57-0x0000000001F30000-0x0000000001F64000-memory.dmp

    • Size

      208KB

    • MD5

      172a23d45b275cc281abe75813149975

    • SHA1

      62079f3573503b43baa807e2fa3562733d0933ca

    • SHA256

      d8032b8a39044fe439fa6d591fd1080beef8cfac2ca527953df68ec500109272

    • SHA512

      e448d59bddc84e8c485e6edf4d40942f533c102bce33b460436782de8f4535c9ca9abf4b2d8751a9c67cf8c63d92e570db158e89cc01713d03a768b09b661c89

    • SSDEEP

      3072:d8S4s69gQu2l1/+lEH52BIPUVQ+RwM+IB+SaDtsA4+rSzPDJ8e8h0:KS4s6Pl1/jUhtcSMtsASR

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks