General

  • Target

    9732d4482e2cf4d1685ac60e8ec19a13b24de4851106917fb0c8d8c1b73920da

  • Size

    389KB

  • Sample

    240326-2qrytaed36

  • MD5

    43d0038cbeedc5a57f52f0bea45d99b2

  • SHA1

    64d98866b0e6afd1d99dfe717278dd87d94aa098

  • SHA256

    9732d4482e2cf4d1685ac60e8ec19a13b24de4851106917fb0c8d8c1b73920da

  • SHA512

    af2ebf66f1e3a1e3a12bd4cebeef92d44710fbbc08c9e8bb8bb02e1d22577c9c3adb17ef0f4723f6ffa9ba5bcf31ad1a0901e5cf319964f34acb7e52a1300bb9

  • SSDEEP

    6144:+naaTH28oVpMr7mHirmj+Tun3gseL//lv1tMV6l:+naaTHYVp6mGmjcuH6l

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Bot: @logsdillabot)

C2

5.42.65.68:29093

Targets

    • Target

      9732d4482e2cf4d1685ac60e8ec19a13b24de4851106917fb0c8d8c1b73920da

    • Size

      389KB

    • MD5

      43d0038cbeedc5a57f52f0bea45d99b2

    • SHA1

      64d98866b0e6afd1d99dfe717278dd87d94aa098

    • SHA256

      9732d4482e2cf4d1685ac60e8ec19a13b24de4851106917fb0c8d8c1b73920da

    • SHA512

      af2ebf66f1e3a1e3a12bd4cebeef92d44710fbbc08c9e8bb8bb02e1d22577c9c3adb17ef0f4723f6ffa9ba5bcf31ad1a0901e5cf319964f34acb7e52a1300bb9

    • SSDEEP

      6144:+naaTH28oVpMr7mHirmj+Tun3gseL//lv1tMV6l:+naaTHYVp6mGmjcuH6l

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks