General

  • Target

    beed06c4844fec238d982f8389a95e2a1dcd18ef1c2f1d9870a0561d20702073

  • Size

    313KB

  • Sample

    240826-frqaqayaqq

  • MD5

    95fe51bf6712dabad88f0dff35b9cc2a

  • SHA1

    923a6370d5acbfccebaefcb467bceda66a8b8f1f

  • SHA256

    beed06c4844fec238d982f8389a95e2a1dcd18ef1c2f1d9870a0561d20702073

  • SHA512

    82a80fc828a59421646f8016d4119ba4844ba90c1cb74b9415ce729df8dd8aaec5f8848a0f5ebee3b22042a250f2c650ee0adc8450d52116eb4f4c460acdc9cc

  • SSDEEP

    6144:7H0sclO4bX+ZOJGlROK4jnctVLqOfpzXQHjiboVWWaODsoC1NwzBt9gvMSH/QrVF:T0x8ZV7OK2aVDtXyLYWnDsoQ4t9kTorz

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

147.45.47.36:14537

Targets

    • Target

      beed06c4844fec238d982f8389a95e2a1dcd18ef1c2f1d9870a0561d20702073

    • Size

      313KB

    • MD5

      95fe51bf6712dabad88f0dff35b9cc2a

    • SHA1

      923a6370d5acbfccebaefcb467bceda66a8b8f1f

    • SHA256

      beed06c4844fec238d982f8389a95e2a1dcd18ef1c2f1d9870a0561d20702073

    • SHA512

      82a80fc828a59421646f8016d4119ba4844ba90c1cb74b9415ce729df8dd8aaec5f8848a0f5ebee3b22042a250f2c650ee0adc8450d52116eb4f4c460acdc9cc

    • SSDEEP

      6144:7H0sclO4bX+ZOJGlROK4jnctVLqOfpzXQHjiboVWWaODsoC1NwzBt9gvMSH/QrVF:T0x8ZV7OK2aVDtXyLYWnDsoQ4t9kTorz

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks