General

  • Target

    redline.exe

  • Size

    488KB

  • Sample

    240927-lr6klayhnb

  • MD5

    f68f9278476722e1514a5fea0bd3c451

  • SHA1

    fa6110e38b9f41e2e8e30e0c4ec717376e78f2d7

  • SHA256

    f4b731f9be594cb8e8958a72151f4749c16101df04a056e03afbcb74793b8fb4

  • SHA512

    6d42c37a64047ab20179309ee66a668cb3acdb4fbcd6abbbc788a908b1bf7eea65b994d7c2bb31372bb5a15c082067ed82844038364176c874ef90062f570281

  • SSDEEP

    6144:jPsjhqCFe3qt7NdOFOZbNimife3l6Tc+eEq3Aa:j6Pe3qt7NdOIgHfe3lh3

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

91.211.248.215:24327

Targets

    • Target

      redline.exe

    • Size

      488KB

    • MD5

      f68f9278476722e1514a5fea0bd3c451

    • SHA1

      fa6110e38b9f41e2e8e30e0c4ec717376e78f2d7

    • SHA256

      f4b731f9be594cb8e8958a72151f4749c16101df04a056e03afbcb74793b8fb4

    • SHA512

      6d42c37a64047ab20179309ee66a668cb3acdb4fbcd6abbbc788a908b1bf7eea65b994d7c2bb31372bb5a15c082067ed82844038364176c874ef90062f570281

    • SSDEEP

      6144:jPsjhqCFe3qt7NdOFOZbNimife3l6Tc+eEq3Aa:j6Pe3qt7NdOIgHfe3lh3

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks