General

  • Target

    e600b6015b0312b52214f459fcc6f3c2.bin

  • Size

    314KB

  • Sample

    240907-cbp38syhqk

  • MD5

    06ee8cf1f9b3238ccb09f4da75b9349f

  • SHA1

    87d070bde659b5dad58c004f208472d38662e17f

  • SHA256

    78393264f1c4e8976afccf462ee02298b293f0dde66d72d36327f7d1000552e6

  • SHA512

    728f9d6c274d9bd42bf8b9a2100d834bb33026ce9433f22a66e7f8f0617b913de764d5aaf08519c255e7d233a6d93fa5ebf09db860e4dbc8d9a6657cb0766706

  • SSDEEP

    6144:QkR7zlM0kfY9gzeO0X4PmmbQDR/bBxpRzMYviJYDdbgv815PLO:QAqA9gzIkFbQDR/bBvRAYqJf015PLO

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

147.45.47.36:30035

Targets

    • Target

      65bb6281d63ad091f8b6b4d0c460d9d6c1631fe141fe15b23dc6d23a41e094ad.exe

    • Size

      324KB

    • MD5

      e600b6015b0312b52214f459fcc6f3c2

    • SHA1

      0e763e33524e467b46d27e5f0603cd2165c47fed

    • SHA256

      65bb6281d63ad091f8b6b4d0c460d9d6c1631fe141fe15b23dc6d23a41e094ad

    • SHA512

      b1c1a68128c2cd75df9cb1d890358fd6bb85d9a62288468a19db3295cc25e6cb97c05fa0b5bc3b1dd2b88bd39b343ce5cd1494ca8ab56352c1e375e88fe7e464

    • SSDEEP

      6144:sPP5QJyXEJZq77hQ8ed1oBj32nQumiUdfg+CYnDNMhXYGenCnaW1qMJyky:cGJyX2EdQ8ed1K+Yfg+DDGYn4aW1TJyD

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks