General

  • Target

    f408c8ba5781966f6ce1da805de79deb4a5e3c9dfbe097493123257e6112bf71

  • Size

    507KB

  • Sample

    240722-fx66es1ann

  • MD5

    ae74c6d6ed392c35afafedfc9316d163

  • SHA1

    1d2292a6c7bd70569cba3410308a1eb2dcc325b3

  • SHA256

    f408c8ba5781966f6ce1da805de79deb4a5e3c9dfbe097493123257e6112bf71

  • SHA512

    91f60b341a473534224ef2668102ec2fd047afa30e2f72c8ba8bb880688b3f1310f6d2a24c1ca317e1af8ba4cf336951ff2a5b948f477bb3dd1502798aa35f03

  • SSDEEP

    12288:m6LAu5tBQFA2pAmR+IhIiI82uJhktKFB22Ce:m6H5oFRVIohrpZ

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

77.105.135.107:3445

Targets

    • Target

      f408c8ba5781966f6ce1da805de79deb4a5e3c9dfbe097493123257e6112bf71

    • Size

      507KB

    • MD5

      ae74c6d6ed392c35afafedfc9316d163

    • SHA1

      1d2292a6c7bd70569cba3410308a1eb2dcc325b3

    • SHA256

      f408c8ba5781966f6ce1da805de79deb4a5e3c9dfbe097493123257e6112bf71

    • SHA512

      91f60b341a473534224ef2668102ec2fd047afa30e2f72c8ba8bb880688b3f1310f6d2a24c1ca317e1af8ba4cf336951ff2a5b948f477bb3dd1502798aa35f03

    • SSDEEP

      12288:m6LAu5tBQFA2pAmR+IhIiI82uJhktKFB22Ce:m6H5oFRVIohrpZ

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks