General

  • Target

    file.exe

  • Size

    459KB

  • Sample

    240522-sfk8vafc6x

  • MD5

    fdc69e7726f37315f2f576a3ca749c48

  • SHA1

    44cb651c3be86b959e4e630e741189ad2c945c44

  • SHA256

    1692db4e522605d93551ddcabeffa92a2cd43e764a134833644808319784b955

  • SHA512

    de974aa0e7cb1393eefacbd90a87f2283af59004de217283b9dbba2c338935aa013ba738065747d2491248ca3d781ee7ede0044082a58da3fa21989e3431dc2f

  • SSDEEP

    12288:REY+q1cYutAScujVzQ/B02L4dj5w2TUTup:W6ScuJzI028dNNUKp

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

5.42.65.115:40551

Targets

    • Target

      file.exe

    • Size

      459KB

    • MD5

      fdc69e7726f37315f2f576a3ca749c48

    • SHA1

      44cb651c3be86b959e4e630e741189ad2c945c44

    • SHA256

      1692db4e522605d93551ddcabeffa92a2cd43e764a134833644808319784b955

    • SHA512

      de974aa0e7cb1393eefacbd90a87f2283af59004de217283b9dbba2c338935aa013ba738065747d2491248ca3d781ee7ede0044082a58da3fa21989e3431dc2f

    • SSDEEP

      12288:REY+q1cYutAScujVzQ/B02L4dj5w2TUTup:W6ScuJzI028dNNUKp

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks