General

  • Target

    fe8b79e2efd9685857c859a5449501fdac4cb227b478beaa6c6f765d12589f0b

  • Size

    497KB

  • Sample

    240704-2rw9xstflk

  • MD5

    7a7a09f3db15ab0f19a9a6f359fef8d7

  • SHA1

    1096c1a07df97a68760fb1b4d2a932aed7e37aba

  • SHA256

    fe8b79e2efd9685857c859a5449501fdac4cb227b478beaa6c6f765d12589f0b

  • SHA512

    8f48e95c8e500f278198b5182b811247ed84401785b3718090930e7a99101d1380979a55c3784f60711baa7a3b1fb9829504df6c290627d0e7596e67d7d2e3fe

  • SSDEEP

    12288:7COROIn2UaYK91zzI4G2YKudQjDV8bFr7GPPH6xKleovRAxO1A6:7COIA2MII4G2gQ29ePaxxca

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

77.105.135.107:3445

Targets

    • Target

      fe8b79e2efd9685857c859a5449501fdac4cb227b478beaa6c6f765d12589f0b

    • Size

      497KB

    • MD5

      7a7a09f3db15ab0f19a9a6f359fef8d7

    • SHA1

      1096c1a07df97a68760fb1b4d2a932aed7e37aba

    • SHA256

      fe8b79e2efd9685857c859a5449501fdac4cb227b478beaa6c6f765d12589f0b

    • SHA512

      8f48e95c8e500f278198b5182b811247ed84401785b3718090930e7a99101d1380979a55c3784f60711baa7a3b1fb9829504df6c290627d0e7596e67d7d2e3fe

    • SSDEEP

      12288:7COROIn2UaYK91zzI4G2YKudQjDV8bFr7GPPH6xKleovRAxO1A6:7COIA2MII4G2gQ29ePaxxca

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks