General

  • Target

    44e3698201a47d052fcfce1dd5acab852689853fefbf2db30abc3efce47a7117

  • Size

    324KB

  • Sample

    240417-q9njysag58

  • MD5

    f3fd819cedfa9076db5988b857c735c8

  • SHA1

    b90d6c074ddeaa4171588d2d042fdb5dba5dc7e9

  • SHA256

    44e3698201a47d052fcfce1dd5acab852689853fefbf2db30abc3efce47a7117

  • SHA512

    e5bd0789e10c4b567c33814012afa17e6fe94cb6a8f466cdcb594537e751c92e9a0e74a92673443f0dc6e647fffb59e07362f553ead670cb1ba623dcdc0b2fbb

  • SSDEEP

    6144:Rs22BX3iA5ZgwFJna661piNEJDu89RT1owRX1EkHvD4cVy2Bo/H7hb:RsJBiCFJn+pCSTmwRXukHvscVy2Bo/Ht

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

5.42.65.68:29093

Targets

    • Target

      510b869c94a97119300b01538e77f25986d22180cfa41766beb7741bd5fcb7e7.exe

    • Size

      340KB

    • MD5

      8cdd41551a6610b0fedd52ba60de3609

    • SHA1

      5657cc270ea93c78dc31701e615b6ee3402da7d9

    • SHA256

      510b869c94a97119300b01538e77f25986d22180cfa41766beb7741bd5fcb7e7

    • SHA512

      dc18a81d0318cb1530fd3e1170e22d203d89da3fe7faea43ffc99d440943c0432b9311c18e875c6457ddab815877b3cc7c738e15c727af6c663c10cd9c8eb161

    • SSDEEP

      6144:Rz3byDV0ryw+jcvGYqX6811Ok8qBVgfaHjmUWIAUqhaX8WWqNUHMhyFdsac:Rz3byJ4yw+wVL811l8qBVjWO3XZHqHMW

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks