General

  • Target

    ab06af28eabd848a572023a76ce875ac.bin

  • Size

    309KB

  • Sample

    240913-bzc8xaxema

  • MD5

    3b1e52c6b50e03720d59beca39f7c3c0

  • SHA1

    952a7b2b960591a9a94a7b5b2de65d73d0040405

  • SHA256

    7fc7c454510f5341a45913490a9406522205197ec97144de1b85f1363adb3614

  • SHA512

    9ec07748442d3f899d213470298538a3e9f54ef6b1ae626fa523fdce70ed04617927c733a416719b45e797061552da337d6731f347ea1946f27de6e237a85d90

  • SSDEEP

    6144:dJV1FWmdNIl0fvfMSiN1FjcNpfwWOVF2GRdhO/nr3X/zd+MvLtOp173:xemetmpfAfDl2n7rd+MQph

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

185.203.241.68:40901

Targets

    • Target

      f3d5417adab3fcf3d8f70ed37e7acef0b677ab7907122c7900133ebfa00d8458.exe

    • Size

      312KB

    • MD5

      ab06af28eabd848a572023a76ce875ac

    • SHA1

      80a6338acd08b1c52b008179ed1c43fa6892fac5

    • SHA256

      f3d5417adab3fcf3d8f70ed37e7acef0b677ab7907122c7900133ebfa00d8458

    • SHA512

      1a9ed3fd31a495b4b43f778e0d63bd338c53aea45efe4d51509bdbb067faa74c0d8cc6e1a9908bb020302b8642852e46c0eeccc9b040e6ca2e1499640dca54cb

    • SSDEEP

      6144:yMBav/6NbgdGyUe+nHarbN/sTeZdTCHqbu8uHTQNZxNSlggZ1zz8fkg:xsvWbgdhJ0GZsITg+uRHTQjmlggZ2

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks