General

  • Target

    413f6518e54b384d06d4d76740b66702.bin

  • Size

    250KB

  • Sample

    230722-bpp5qahg9s

  • MD5

    ec3f3b79bc92dff229956bc741613622

  • SHA1

    719eafa19e89da135da3b87935853f1c7f58253b

  • SHA256

    addcc44894ffaebafe83d8b5829faed55bc28f8d20e317567125df3b9babca84

  • SHA512

    1d6364f455d68e7a6378c1e5244cdb01e0aed9b37efd5f0a6531095421ca609894ae27e1882e3d597b1875487ffd2bfcd268d4bbe296381afbf49085e0ca3888

  • SSDEEP

    6144:bO97P5CFFK1xK8LIdBrNlDT0TIujngVc9gX:q9jkK1xK8LwBBlDT08AC+gX

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Bot: @logsdillabot)

C2

178.32.90.250:29608

Attributes
  • auth_value

    ed000008c0b59caf793b48c8ea9a7233

Targets

    • Target

      cdbfb15564317948c800599bf4e4ae31ca937d89a716dc1bf52752e10fa7980a.exe

    • Size

      397KB

    • MD5

      413f6518e54b384d06d4d76740b66702

    • SHA1

      a3e91e443fc618f0dc20dbedbaab32c0b7234be9

    • SHA256

      cdbfb15564317948c800599bf4e4ae31ca937d89a716dc1bf52752e10fa7980a

    • SHA512

      3139de28aefb11726340b883960f5d9f55378d517f90d672010cf1c0ee00e5c5ae8b039ffc4246ba445ecb9fbc44321ce5069842cf043d54f818315fb6144c56

    • SSDEEP

      6144:DsZLSapG94HsVkWgpMOXatr2a1z2pN9QvDLH9:4Z+apPHsVkWgpMPtqa5MfQ39

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks