General

  • Target

    010db379e364c7bda5073df61828ce0adcacaa3ab3397a449c7f98ee20521fce

  • Size

    323KB

  • Sample

    240919-2etchavbnj

  • MD5

    c7fce4265a5346ff9d2413813886afce

  • SHA1

    f6573a0b128dd29af3dd40e247bef6af27b2ef97

  • SHA256

    010db379e364c7bda5073df61828ce0adcacaa3ab3397a449c7f98ee20521fce

  • SHA512

    5c9a5239b6bc066655e2c28f296a8197916611d22c92ad58df846ac892d1ff70dd694d215f58192a16910e44cdf11ba07f981e7d35ea322dddf57aa262a47ddd

  • SSDEEP

    6144:qyuooM8GZfDumFvuU2bmJtNZEpDbwQ/+5Ak43NN/Uuq10KhULPy+a76:VuoKGZfyVstXsbCAn3PrMoyd76

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

193.233.255.84:4284

Targets

    • Target

      010db379e364c7bda5073df61828ce0adcacaa3ab3397a449c7f98ee20521fce

    • Size

      323KB

    • MD5

      c7fce4265a5346ff9d2413813886afce

    • SHA1

      f6573a0b128dd29af3dd40e247bef6af27b2ef97

    • SHA256

      010db379e364c7bda5073df61828ce0adcacaa3ab3397a449c7f98ee20521fce

    • SHA512

      5c9a5239b6bc066655e2c28f296a8197916611d22c92ad58df846ac892d1ff70dd694d215f58192a16910e44cdf11ba07f981e7d35ea322dddf57aa262a47ddd

    • SSDEEP

      6144:qyuooM8GZfDumFvuU2bmJtNZEpDbwQ/+5Ak43NN/Uuq10KhULPy+a76:VuoKGZfyVstXsbCAn3PrMoyd76

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks