General

  • Target

    c30feb6c9c747d590d77ccfa1e15d719.exe

  • Size

    385KB

  • Sample

    230808-matp5sdd9t

  • MD5

    c30feb6c9c747d590d77ccfa1e15d719

  • SHA1

    a25c36f12ecfa778f0d93ee625dc9bf7b341078a

  • SHA256

    a85e18b20a3a73f084789d9d4b4a8d140e7d4c85b60b0741b585510cfec89df4

  • SHA512

    37498207c637bab33f5d64c41279c3fb6af830c573170a53efcbfa07dc26d2f1a599dd7ebec7a8c767c4533d1a7fd3858944e79d6eb54c006ce894fcf9dbe96f

  • SSDEEP

    6144:d4qo+62RpmrofFTIEuz30y8tt7ma+TkocdI7dc1r:dZJ62Rm2TIEU3W7maKkocWu

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

209.250.248.11:33522

Attributes
  • auth_value

    3a050df92d0cf082b2cdaf87863616be

Targets

    • Target

      c30feb6c9c747d590d77ccfa1e15d719.exe

    • Size

      385KB

    • MD5

      c30feb6c9c747d590d77ccfa1e15d719

    • SHA1

      a25c36f12ecfa778f0d93ee625dc9bf7b341078a

    • SHA256

      a85e18b20a3a73f084789d9d4b4a8d140e7d4c85b60b0741b585510cfec89df4

    • SHA512

      37498207c637bab33f5d64c41279c3fb6af830c573170a53efcbfa07dc26d2f1a599dd7ebec7a8c767c4533d1a7fd3858944e79d6eb54c006ce894fcf9dbe96f

    • SSDEEP

      6144:d4qo+62RpmrofFTIEuz30y8tt7ma+TkocdI7dc1r:dZJ62Rm2TIEU3W7maKkocWu

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

MITRE ATT&CK Enterprise v15

Tasks