General

  • Target

    file

  • Size

    804KB

  • Sample

    230821-jwteqabf62

  • MD5

    67445af34314a6aba1f685885a3e2aaf

  • SHA1

    1a7cec4106a837a9d31edf92c90ebc3cb2ccd27d

  • SHA256

    b154c3d8a7d71c3fd64fb2a3c41e72ad9289dc9b7c905512dc928893a31086b2

  • SHA512

    b32475da1358568e6051543878b7ff89b1ade4a9f4860b4e5f66c7e5a3373d3503d440ff6f771b8977e21f48c46a8c36f28ca94d5005c8b1c2efe859fcd07bcf

  • SSDEEP

    12288:h472Og6pEAt2NxW7t5dEuPDP1/mUIg7SVxzMAriXujoo/mutndxRFI:O7s6pEAt2NxW7lLNmUIg7SVxotwxRF

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

149.202.0.242:31728

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Targets

    • Target

      file

    • Size

      804KB

    • MD5

      67445af34314a6aba1f685885a3e2aaf

    • SHA1

      1a7cec4106a837a9d31edf92c90ebc3cb2ccd27d

    • SHA256

      b154c3d8a7d71c3fd64fb2a3c41e72ad9289dc9b7c905512dc928893a31086b2

    • SHA512

      b32475da1358568e6051543878b7ff89b1ade4a9f4860b4e5f66c7e5a3373d3503d440ff6f771b8977e21f48c46a8c36f28ca94d5005c8b1c2efe859fcd07bcf

    • SSDEEP

      12288:h472Og6pEAt2NxW7t5dEuPDP1/mUIg7SVxzMAriXujoo/mutndxRFI:O7s6pEAt2NxW7lLNmUIg7SVxotwxRF

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks