General

  • Target

    9545cb95accf9eb43999ff192849f2c8c2ef8286c3fc1232d3750cbcd9c8dc4e.exe

  • Size

    313KB

  • Sample

    240922-qdgrja1dkq

  • MD5

    4e97e36dd5e4fae769cb1ade01d9be99

  • SHA1

    b1220d2748e84cca637192291c49a9641ebb348e

  • SHA256

    9545cb95accf9eb43999ff192849f2c8c2ef8286c3fc1232d3750cbcd9c8dc4e

  • SHA512

    7137ff8dc9807fbe046a5daf432871b96cfb2286e76d0e765f5966ed9a1734f44ef9386d22cc98aadece40998bc8e86632b55506c7a9b45af515db1eb25eaf3d

  • SSDEEP

    6144:49SiPY2r9uh6YdytMe6J5jiqsGN9r0u2iIRBd0VlzC7El8GzgsJFkci:wZPYg9uhbc6JRLN9IiKaVltl8g1kc

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

193.233.255.77:1891

Targets

    • Target

      9545cb95accf9eb43999ff192849f2c8c2ef8286c3fc1232d3750cbcd9c8dc4e.exe

    • Size

      313KB

    • MD5

      4e97e36dd5e4fae769cb1ade01d9be99

    • SHA1

      b1220d2748e84cca637192291c49a9641ebb348e

    • SHA256

      9545cb95accf9eb43999ff192849f2c8c2ef8286c3fc1232d3750cbcd9c8dc4e

    • SHA512

      7137ff8dc9807fbe046a5daf432871b96cfb2286e76d0e765f5966ed9a1734f44ef9386d22cc98aadece40998bc8e86632b55506c7a9b45af515db1eb25eaf3d

    • SSDEEP

      6144:49SiPY2r9uh6YdytMe6J5jiqsGN9r0u2iIRBd0VlzC7El8GzgsJFkci:wZPYg9uhbc6JRLN9IiKaVltl8g1kc

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks