General

  • Target

    2f05df98b8de8af85942d15c1c7d434ee62be3e3662c551a0e14d29c9531c1cc.exe

  • Size

    304KB

  • Sample

    240523-bnn62agb7y

  • MD5

    1fb1c8da0fabb641a76ac6759dd557dd

  • SHA1

    eac9ef0a2bb9058efcc01242184f7a10136a5036

  • SHA256

    2f05df98b8de8af85942d15c1c7d434ee62be3e3662c551a0e14d29c9531c1cc

  • SHA512

    44623c837f1537783e44703637407b3330db2201800f0ab5d2552f3b67368b320734e1fa12143c1ed9df75518c641817039bec7ec74c2c18d4efe22dd83739cd

  • SSDEEP

    3072:1q6EgY6iHrUj1DeewPMAVTmz+qGwRTAAtpSKGscZqf7D341eqiOLibBOp:8qY6iwwPv9priTA8pIscZqf7DIfL

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

5.42.65.115:40551

Targets

    • Target

      2f05df98b8de8af85942d15c1c7d434ee62be3e3662c551a0e14d29c9531c1cc.exe

    • Size

      304KB

    • MD5

      1fb1c8da0fabb641a76ac6759dd557dd

    • SHA1

      eac9ef0a2bb9058efcc01242184f7a10136a5036

    • SHA256

      2f05df98b8de8af85942d15c1c7d434ee62be3e3662c551a0e14d29c9531c1cc

    • SHA512

      44623c837f1537783e44703637407b3330db2201800f0ab5d2552f3b67368b320734e1fa12143c1ed9df75518c641817039bec7ec74c2c18d4efe22dd83739cd

    • SSDEEP

      3072:1q6EgY6iHrUj1DeewPMAVTmz+qGwRTAAtpSKGscZqf7D341eqiOLibBOp:8qY6iwwPv9priTA8pIscZqf7DIfL

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks