General

  • Target

    fe66f56059559cc500bb6f41a23847bf.bin

  • Size

    394KB

  • Sample

    240501-cgbg2afe86

  • MD5

    d9bcb3a5aa5a8692b0c5b4022f8e8317

  • SHA1

    6c8fac409162ed5d5296d33962f16f9a195fdfca

  • SHA256

    bb9d33d7334079ea0d27ca5c9491faf6d0ac74e01ffa117146d66a0be83317d1

  • SHA512

    8aeb483d01dc657984e27c4ecca0f14efba31aab498997630b679757cf0c62cb2fd9cc9f945513c872277c7e2c5ccb3db4b37557cba2009a32ff9c35a870fe32

  • SSDEEP

    12288:wUYgkjh0es1RErJ6b39NM13X6cdUOdLyFk:wXflZkb3fM1acdUeyFk

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

5.42.65.96:28380

Targets

    • Target

      1b3d4f28bdc4aa5bb91b63d4166da305976fbfd3d185a3ed425e0d09e573a572.exe

    • Size

      472KB

    • MD5

      fe66f56059559cc500bb6f41a23847bf

    • SHA1

      8954970a8026c1cea95f5dee7509c32d0cac1d7d

    • SHA256

      1b3d4f28bdc4aa5bb91b63d4166da305976fbfd3d185a3ed425e0d09e573a572

    • SHA512

      0b993bec47840871f85357e1e72695fb7a5d8a745bce379b3c1ba297b89079cc7c846344a3c7390d539d2a33bbcd8f80be949132d8431ffe120460aa2f7f6fc7

    • SSDEEP

      12288:+ASkTUGRODeHPHDYUNZrLMhIu026AnmAyr:+A4GBjYS3MhIZAI

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks