General

  • Target

    1f42845cc77788cdff450881958e68a4.bin

  • Size

    249KB

  • Sample

    230722-bgkj9shc78

  • MD5

    bb043e16ad236df89eac1367b6f6a2f0

  • SHA1

    8525e5631385b24c2be65895cfd1e3f2a523af50

  • SHA256

    ef4fc22bbe8f8d8a2ab1c1b4cffc6eb001f690223d146c62977374e23701a741

  • SHA512

    7b68bf7554cee63577d76de0fdf1fac9a4454c3a099054bbc9faf3ea445b27a3e7873532d2fc887fbfe7a4372e62bcdd113fcf0a4c2e7aa6806e477ae1dc89cd

  • SSDEEP

    6144:pnnj19NO5yDlRy3WVvDPFfekHi/BRRts9pSY351qc:Fjj8ilXvDPFf+ZRU9pp7qc

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

178.32.90.250:29608

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Targets

    • Target

      3fcdecef118704af028e93d5e5624849f86bd6b9af7f67e226675accc5ed44ac.exe

    • Size

      395KB

    • MD5

      1f42845cc77788cdff450881958e68a4

    • SHA1

      4c9dcbb076b6da2f49ac5d9f8f20aa2c1d428169

    • SHA256

      3fcdecef118704af028e93d5e5624849f86bd6b9af7f67e226675accc5ed44ac

    • SHA512

      f87d1884ba6770040aa6485aa488d7e42fe4f10ad856245aeebe3d0bf7383f9e23cb40ef593e3a7c600454fc3685ff252930988a09d49cb3dd23b53e858b832f

    • SSDEEP

      3072:OkibvLmLAvc8bH+66gUljGecuHXacRsfeHlLCpeQdc6TXXLiGuLTTLkckC5WL6T:UjCLAbLovcrcBcpesPXXLiGYWRUySm

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks