General

  • Target

    059a06b50e3fd6dca1d7a9b23dfb5899c2375dbc2efc04ec0d331e27dd9452fb

  • Size

    343KB

  • Sample

    240417-q8vlwacb81

  • MD5

    200c7fa77a1cb7fb623632af501b5fb8

  • SHA1

    931faddd6b5585241b7b7c8c134f04d00aa03253

  • SHA256

    059a06b50e3fd6dca1d7a9b23dfb5899c2375dbc2efc04ec0d331e27dd9452fb

  • SHA512

    736ae116311af412d6c6233fff91074f777fc247d796b8b0057e7b459a2e482fbed7ed9fcd123915ac37010d7549446ea7b40bd3252851608ef3cef3f9a4e7ed

  • SSDEEP

    6144:o2Mp1N3K8HGnyKx5P00PhsGJ8XwcPf2nWLlARjVtJaiP8xC7cQV49oTx:epXjKT00iGJYwcmWLkhtM67H48

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

5.42.65.68:29093

Targets

    • Target

      a5fa4a9924738f31e1f7d2436d75af6bae105771ec2cac40f07d953880931e8d.exe

    • Size

      374KB

    • MD5

      e95081602cb904d9ea3d809724c71a7e

    • SHA1

      bbaf6ea75ef068cd28f327ca7c321faeb9019dd0

    • SHA256

      a5fa4a9924738f31e1f7d2436d75af6bae105771ec2cac40f07d953880931e8d

    • SHA512

      16b1dc915c02babca267573377bc766ca402a8f69f8f4e20526044ff90a00230938dd1926069bec9bc0c3c66ca13b3a9021277e1cf6f09e44b00a53661220815

    • SSDEEP

      6144:q+OYiRk78wIxWDP7iECDC1t6qmdFfih1IIddNbiojyWzBs5ZzvU/x3ip6JRfBOCv:DOYOk1SWTnKC1C6fIIddNbiojyMs5Zz6

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks