General

  • Target

    file

  • Size

    1.2MB

  • Sample

    240423-sqjg1ahd57

  • MD5

    f1662fbb012843190b9ad18c76d0141f

  • SHA1

    996d7ca6229cedbebde5a0bf7bb67c635bf7b279

  • SHA256

    d6016d6c87d7f59a478fe33ccff3a34e86de50b8700167b161da920561598669

  • SHA512

    8265cf665bd763cdd30b29086bd6fe51d27f182db8fd92bb42dbed4c38dd03b2e5460366b107a48daab0f10c3c27962a4209d1000f1a1de8dd2007eae415697c

  • SSDEEP

    24576:Msxl3hAS7tUhU5M/i8t7avB+eU/SvHNmCftCLRoa:Mi9tUhU5M/y4tSHC

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

5.42.65.96:28380

Targets

    • Target

      file

    • Size

      1.2MB

    • MD5

      f1662fbb012843190b9ad18c76d0141f

    • SHA1

      996d7ca6229cedbebde5a0bf7bb67c635bf7b279

    • SHA256

      d6016d6c87d7f59a478fe33ccff3a34e86de50b8700167b161da920561598669

    • SHA512

      8265cf665bd763cdd30b29086bd6fe51d27f182db8fd92bb42dbed4c38dd03b2e5460366b107a48daab0f10c3c27962a4209d1000f1a1de8dd2007eae415697c

    • SSDEEP

      24576:Msxl3hAS7tUhU5M/i8t7avB+eU/SvHNmCftCLRoa:Mi9tUhU5M/y4tSHC

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks