General

  • Target

    804b2380675be1a72c09800f35b0da110a74a61cff92cebaf22182fc93874340.exe

  • Size

    469KB

  • Sample

    240423-bw23vsah86

  • MD5

    7fe965830a88092157b8f558a6aa3c3c

  • SHA1

    727a3f4efcd686b67224ab655f438b7878d1ee18

  • SHA256

    804b2380675be1a72c09800f35b0da110a74a61cff92cebaf22182fc93874340

  • SHA512

    f31d76c1236db390975ba9b8ef5212b8b94275cc0e967894cb334d6e24d2e76afc7c3449d515173c732dcfb703b70c82aa0eeb88cbfa56de73bcda49213cc5f6

  • SSDEEP

    6144:dZlB8LBngajQdG5uRWaV7P8psETjdTyK0Qh/wS+dDaUIVVPmKErwNfiQuZx5Wwpr:3lBm8euLP8KEXdu7amkDVbEMNubTpr

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

5.42.65.50:33080

Targets

    • Target

      804b2380675be1a72c09800f35b0da110a74a61cff92cebaf22182fc93874340.exe

    • Size

      469KB

    • MD5

      7fe965830a88092157b8f558a6aa3c3c

    • SHA1

      727a3f4efcd686b67224ab655f438b7878d1ee18

    • SHA256

      804b2380675be1a72c09800f35b0da110a74a61cff92cebaf22182fc93874340

    • SHA512

      f31d76c1236db390975ba9b8ef5212b8b94275cc0e967894cb334d6e24d2e76afc7c3449d515173c732dcfb703b70c82aa0eeb88cbfa56de73bcda49213cc5f6

    • SSDEEP

      6144:dZlB8LBngajQdG5uRWaV7P8psETjdTyK0Qh/wS+dDaUIVVPmKErwNfiQuZx5Wwpr:3lBm8euLP8KEXdu7amkDVbEMNubTpr

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks