General

  • Target

    a477e784517edb8205cd457bc48b3815.bin

  • Size

    203KB

  • Sample

    230716-cgmv3acc72

  • MD5

    b33030e31c4848cdf995ea51ec160af3

  • SHA1

    ae8e651f3b148ff951a8f16b81d5f4ee8f830c8d

  • SHA256

    677b2d86491ac8ff179d9fedf454f12194ef5fcf29798a98bdc92df120cc7a74

  • SHA512

    6c16fa72afcad41d94e932d15edc148d8115d2384540d20587abe5fe9bace45b714476b4943412be8c20396ec39a5c1243905987f36e8dddcfc7045afef5ec00

  • SSDEEP

    6144:SgMJybWAwBSs2JAJxrJjUuEwLcyXxWwhdb:SgMJyCAQWLuEoddb

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

147.135.165.22:17748

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Targets

    • Target

      549049c206798ac82da3d7bf88fec6d324737390070547998c0828b916905d9c.exe

    • Size

      243KB

    • MD5

      a477e784517edb8205cd457bc48b3815

    • SHA1

      aa5056861b6734362185e3f864832175da0f70b0

    • SHA256

      549049c206798ac82da3d7bf88fec6d324737390070547998c0828b916905d9c

    • SHA512

      961ab6cb49e96b473571e4ac64d5a0c870f3ef6047ba5aa48cf4d9b7a8d4d1c0ba0a8d4d2890acc0aec1c8a3e809ed76b35606ed96c92a34255a810d7f3d621d

    • SSDEEP

      6144:BLk847qGHjoltg7qZ0unKBxrDU/xuM466dQeTJ+:Bf6Dcg7qLyrDSxPGdQSA

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

MITRE ATT&CK Matrix

Tasks