General

  • Target

    9d5c20e8ba2953e6d70e694d537d5f1ff5a0b6fd0adc88f48a087eccc8f91a51.exe

  • Size

    472KB

  • Sample

    240522-cgc1vsha41

  • MD5

    5e0db960120e6c67ccbc0b8a2cdaf6a7

  • SHA1

    3b74573b5304f7c537f41e8827256bcf06d57953

  • SHA256

    9d5c20e8ba2953e6d70e694d537d5f1ff5a0b6fd0adc88f48a087eccc8f91a51

  • SHA512

    96049128d06b3307a08f6b6b3afa664ab8b7850975e458c606e1d901ef79fe4fcdd566c68dbbdc58c4009b76959297345f66c6db6f913dfe88adfc44b5316264

  • SSDEEP

    12288:CxpIXPTj/kUR24H+GlAGEyQWzt6ABi/LzK:aCrjz24hu/yt64+

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

5.42.65.85:45779

Targets

    • Target

      9d5c20e8ba2953e6d70e694d537d5f1ff5a0b6fd0adc88f48a087eccc8f91a51.exe

    • Size

      472KB

    • MD5

      5e0db960120e6c67ccbc0b8a2cdaf6a7

    • SHA1

      3b74573b5304f7c537f41e8827256bcf06d57953

    • SHA256

      9d5c20e8ba2953e6d70e694d537d5f1ff5a0b6fd0adc88f48a087eccc8f91a51

    • SHA512

      96049128d06b3307a08f6b6b3afa664ab8b7850975e458c606e1d901ef79fe4fcdd566c68dbbdc58c4009b76959297345f66c6db6f913dfe88adfc44b5316264

    • SSDEEP

      12288:CxpIXPTj/kUR24H+GlAGEyQWzt6ABi/LzK:aCrjz24hu/yt64+

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks