General

  • Target

    c15c91c578b84e19b66599a4eaa29636.bin

  • Size

    414KB

  • Sample

    240429-b7gw3afb5s

  • MD5

    6496546be1bcc2f49e99771744f45eb5

  • SHA1

    cef48f443cb53674d793a9237d90240f6f9046c6

  • SHA256

    e7468d45f817c28a5601bbc2b0f9912188a036d90b9ccc64c77868467e2862b9

  • SHA512

    1031c427a0f01b1f33ab75011344c2bb2db0f23aa05ed9596ddf1b9e40643fe649da77e7ef1e83c19d87d2ebf7d993a6408f2ce94ef465767d343f2f4668c6f5

  • SSDEEP

    12288:f21SGsP911TAjsOCw+GbJyb0voj6Emai9U8M1pQND:+u9LOPb0iTai9Uqd

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

5.42.65.96:28380

Targets

    • Target

      dee9ad32eab4891fb956f119086543a5220518547f24794812f42e012b0cc1d4.exe

    • Size

      518KB

    • MD5

      c15c91c578b84e19b66599a4eaa29636

    • SHA1

      2baf692d598ade6f2348fa5a875857abb70e4ca9

    • SHA256

      dee9ad32eab4891fb956f119086543a5220518547f24794812f42e012b0cc1d4

    • SHA512

      2268017aa29e327707f3471957296056c496c7ba835c6ddca7f4bed59b1882d93bbaab46c9f4ae1c5ab120f9ceda8a4a096566ad37b23103829676c8cf3b7d77

    • SSDEEP

      12288:pbA9s8w7P9Ca47E6uUlVGd7KaL7mTIFc/K9lTdovsC:KsDb4nKwaXmMy/K/Th

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks