General

  • Target

    52f76abcdc8c78bb67d40de40a4aed7f5c72e552ac5582cc15ed1d33480a8d4b

  • Size

    343KB

  • Sample

    240417-qwxwgahh33

  • MD5

    c5b19a2cffdeecfce00679640bbc2350

  • SHA1

    d8cc55bde435e9d5d2fa6eccf4acb051ce8dc49c

  • SHA256

    52f76abcdc8c78bb67d40de40a4aed7f5c72e552ac5582cc15ed1d33480a8d4b

  • SHA512

    7cd190f64f1bf64b4860238aefedc744dd2377acde5a2ad10877e36c48101faa5bcda1a5001c819b2c31bec89a60446da2483e699c47aeeb8179baf6caee8dab

  • SSDEEP

    6144:npSeXMuSHGb/vPVLw7/UwazStx12BglYtmH240ZDQ5I1nF7xqxQNbo:3XMHGbXPVij1FPH2JZDMkFdquO

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

5.42.65.68:29093

Targets

    • Target

      a5fa4a9924738f31e1f7d2436d75af6bae105771ec2cac40f07d953880931e8d.exe

    • Size

      374KB

    • MD5

      e95081602cb904d9ea3d809724c71a7e

    • SHA1

      bbaf6ea75ef068cd28f327ca7c321faeb9019dd0

    • SHA256

      a5fa4a9924738f31e1f7d2436d75af6bae105771ec2cac40f07d953880931e8d

    • SHA512

      16b1dc915c02babca267573377bc766ca402a8f69f8f4e20526044ff90a00230938dd1926069bec9bc0c3c66ca13b3a9021277e1cf6f09e44b00a53661220815

    • SSDEEP

      6144:q+OYiRk78wIxWDP7iECDC1t6qmdFfih1IIddNbiojyWzBs5ZzvU/x3ip6JRfBOCv:DOYOk1SWTnKC1C6fIIddNbiojyMs5Zz6

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks