General

  • Target

    2982d7fbda8b889a9cc7ea780acd6ab1e03dc69360836a3a60bae08ae6307ad5.exe

  • Size

    313KB

  • Sample

    240923-q9shxa1gja

  • MD5

    6423234685ca0046f61adac81f3b71d2

  • SHA1

    138de6c0170db1a72203475b94583b7f06fbaf1f

  • SHA256

    2982d7fbda8b889a9cc7ea780acd6ab1e03dc69360836a3a60bae08ae6307ad5

  • SHA512

    07ec233c53057f26ecfccd9b3a6e27de373d980fa760c689468357c5f7a8f8f1020aada9263545b38fd8dd19af91cbca2a1006f30294abde278c1c0dec42d3fb

  • SSDEEP

    6144:JdAUBV1OgLYTQdRyAl4V2sHAe2HIRqMkNnT3DhxJgUGCm:4uV1O5Qz/4IsIkkpxxvGC

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

193.3.168.69:41193

Targets

    • Target

      2982d7fbda8b889a9cc7ea780acd6ab1e03dc69360836a3a60bae08ae6307ad5.exe

    • Size

      313KB

    • MD5

      6423234685ca0046f61adac81f3b71d2

    • SHA1

      138de6c0170db1a72203475b94583b7f06fbaf1f

    • SHA256

      2982d7fbda8b889a9cc7ea780acd6ab1e03dc69360836a3a60bae08ae6307ad5

    • SHA512

      07ec233c53057f26ecfccd9b3a6e27de373d980fa760c689468357c5f7a8f8f1020aada9263545b38fd8dd19af91cbca2a1006f30294abde278c1c0dec42d3fb

    • SSDEEP

      6144:JdAUBV1OgLYTQdRyAl4V2sHAe2HIRqMkNnT3DhxJgUGCm:4uV1O5Qz/4IsIkkpxxvGC

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks