General

  • Target

    5ed77020f0296739fb5b4ef5133bbdd84a0c8f69ac71cec490343b26dd066c4d.exe

  • Size

    313KB

  • Sample

    240904-b2t97ssepm

  • MD5

    8e0ae87939388dfd7d6470bdd397b309

  • SHA1

    3af328c5c81fe77ab5d74cc97866e03490e5d080

  • SHA256

    5ed77020f0296739fb5b4ef5133bbdd84a0c8f69ac71cec490343b26dd066c4d

  • SHA512

    d3cfb86296b49744ac9a89b6a4a402e44a3d65c137a4a1f814c698001a2c609f0c7ce9fadd483511f6ec43811a5f81bd145dd1899be728ed3d7a9b3e0bf9a756

  • SSDEEP

    6144:5tvfPrQK/3z/LyPRL30UWUzncwhgaljiLhQzaV8dP//wsrlHdzWcsQnrBu:5tvTz/UEPsg02L0Y8JIsxHd0

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

147.45.47.36:30035

Targets

    • Target

      5ed77020f0296739fb5b4ef5133bbdd84a0c8f69ac71cec490343b26dd066c4d.exe

    • Size

      313KB

    • MD5

      8e0ae87939388dfd7d6470bdd397b309

    • SHA1

      3af328c5c81fe77ab5d74cc97866e03490e5d080

    • SHA256

      5ed77020f0296739fb5b4ef5133bbdd84a0c8f69ac71cec490343b26dd066c4d

    • SHA512

      d3cfb86296b49744ac9a89b6a4a402e44a3d65c137a4a1f814c698001a2c609f0c7ce9fadd483511f6ec43811a5f81bd145dd1899be728ed3d7a9b3e0bf9a756

    • SSDEEP

      6144:5tvfPrQK/3z/LyPRL30UWUzncwhgaljiLhQzaV8dP//wsrlHdzWcsQnrBu:5tvTz/UEPsg02L0Y8JIsxHd0

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks