General

  • Target

    e2570178fad834bcf1902b1c396b800ac4b9b64fcab0632ea70464e8ddbb1299.exe

  • Size

    392KB

  • Sample

    240726-g85x6s1gnj

  • MD5

    623abc60a0ae134178d16c7947b592f3

  • SHA1

    2674ee67c5ed2e3d885589cea11b1bdebec96d71

  • SHA256

    e2570178fad834bcf1902b1c396b800ac4b9b64fcab0632ea70464e8ddbb1299

  • SHA512

    25e2a67280c00bafbab83cc0747922e2d35e4172a211be57d80c781614881a1090a3ad2febb6c85a456f036ef77ca7e7ad6452ee3ed1a5aeaffa22ce14a4519d

  • SSDEEP

    12288:8S9RdssB7MzhCgmdypuJwWasCIQtnSA3zb:Dsm7MFCfd0HWBMjb

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

5.42.65.68:29093

Targets

    • Target

      e2570178fad834bcf1902b1c396b800ac4b9b64fcab0632ea70464e8ddbb1299.exe

    • Size

      392KB

    • MD5

      623abc60a0ae134178d16c7947b592f3

    • SHA1

      2674ee67c5ed2e3d885589cea11b1bdebec96d71

    • SHA256

      e2570178fad834bcf1902b1c396b800ac4b9b64fcab0632ea70464e8ddbb1299

    • SHA512

      25e2a67280c00bafbab83cc0747922e2d35e4172a211be57d80c781614881a1090a3ad2febb6c85a456f036ef77ca7e7ad6452ee3ed1a5aeaffa22ce14a4519d

    • SSDEEP

      12288:8S9RdssB7MzhCgmdypuJwWasCIQtnSA3zb:Dsm7MFCfd0HWBMjb

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks