General

  • Target

    93058e43cdbdae3b4cd091a75e0e5c11e944dd7e2ca76f3ad09c7470e8162503.exe

  • Size

    942KB

  • Sample

    240722-vbfhxaxbrf

  • MD5

    85ea5d81ed7b3727ed450587609cc2f9

  • SHA1

    9dd122202f3e0b7ae1658488c759c093b47e3fc6

  • SHA256

    93058e43cdbdae3b4cd091a75e0e5c11e944dd7e2ca76f3ad09c7470e8162503

  • SHA512

    72272e38c9841804e7772c5927954dfa9c93500cadc4c8ccfb69cf7c63fdbacfe378aef6e3640fdf62d06ffb97f19790d71bf08957af1378bc74de912c2035f5

  • SSDEEP

    24576:f45b7w7d1MSWzL05a8cb3711//DrBecBrGfr2jMp:G6MSWzL05GvnDr0cdjMp

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

77.105.135.107:3445

Targets

    • Target

      93058e43cdbdae3b4cd091a75e0e5c11e944dd7e2ca76f3ad09c7470e8162503.exe

    • Size

      942KB

    • MD5

      85ea5d81ed7b3727ed450587609cc2f9

    • SHA1

      9dd122202f3e0b7ae1658488c759c093b47e3fc6

    • SHA256

      93058e43cdbdae3b4cd091a75e0e5c11e944dd7e2ca76f3ad09c7470e8162503

    • SHA512

      72272e38c9841804e7772c5927954dfa9c93500cadc4c8ccfb69cf7c63fdbacfe378aef6e3640fdf62d06ffb97f19790d71bf08957af1378bc74de912c2035f5

    • SSDEEP

      24576:f45b7w7d1MSWzL05a8cb3711//DrBecBrGfr2jMp:G6MSWzL05GvnDr0cdjMp

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks