General

  • Target

    212f5fb634003890f2b61ade6d3bf474e16787e3f536f0484a2a23f55d562bf0.exe

  • Size

    1.2MB

  • Sample

    240425-bjcbnscg2y

  • MD5

    d41582bde613bd63caffa80f482e692b

  • SHA1

    d1ccf0f0f4224e4daa412c868729977cddec079e

  • SHA256

    212f5fb634003890f2b61ade6d3bf474e16787e3f536f0484a2a23f55d562bf0

  • SHA512

    37defa103178d6e281a62f5cc221380f687740cfcf268c24dbeb7bf1c320fbb94be26ce74234b717cafe5f0c74b527ebf8c063fa4c49594174b68e2753e1474d

  • SSDEEP

    12288:FCRMXFhAS3ocOaKANlQWE4goVyevmV/HSgrouJoz7ZyCwLvsTC/pSiAF1XcwJJSH:FCROhAS3onZANlQWEwtvEPg7SITCCXC

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

5.42.65.96:28380

Targets

    • Target

      212f5fb634003890f2b61ade6d3bf474e16787e3f536f0484a2a23f55d562bf0.exe

    • Size

      1.2MB

    • MD5

      d41582bde613bd63caffa80f482e692b

    • SHA1

      d1ccf0f0f4224e4daa412c868729977cddec079e

    • SHA256

      212f5fb634003890f2b61ade6d3bf474e16787e3f536f0484a2a23f55d562bf0

    • SHA512

      37defa103178d6e281a62f5cc221380f687740cfcf268c24dbeb7bf1c320fbb94be26ce74234b717cafe5f0c74b527ebf8c063fa4c49594174b68e2753e1474d

    • SSDEEP

      12288:FCRMXFhAS3ocOaKANlQWE4goVyevmV/HSgrouJoz7ZyCwLvsTC/pSiAF1XcwJJSH:FCROhAS3onZANlQWEwtvEPg7SITCCXC

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks