General

  • Target

    62475a883074268f197b2f2c5bfe8f581ce947ce837ac20bb6d6e8ecdcf60dd0

  • Size

    166KB

  • Sample

    241105-ah6y8azgme

  • MD5

    2436a621554f77bec49465623597b32a

  • SHA1

    8aa454e61b18e088fb28dba6827609336d2cd5dd

  • SHA256

    62475a883074268f197b2f2c5bfe8f581ce947ce837ac20bb6d6e8ecdcf60dd0

  • SHA512

    60ccbfa6802914bbbf52f190a56395626c170e6fb7fbba08863cba0cc1457fbffb1c87ae8e31131612141cb88d8028d35c8df9f25c86aed28ac21fcaddde81af

  • SSDEEP

    3072:rsMxvmONsYw2pk+Rxk5Fqb1s063fxOYggdVaVRf++6OSOqBmRDxJU2j3tzO+Lkj:rDxvmn2i+RmubS06kYTVOh+e3xJhO+gj

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

51.89.204.181:22299

Attributes
  • auth_value

    3a050df92d0cf082b2cdaf87863616be

Targets

    • Target

      5bade268b67fbd24241fbc7759697cf2515dc54f4812ffc753e12a3db23945ae.exe

    • Size

      1.5MB

    • MD5

      da4360b12f0f88c9b17d67c96505e4c5

    • SHA1

      1cd70d78a30236f05e0cef16da51df1ad7f77d1a

    • SHA256

      5bade268b67fbd24241fbc7759697cf2515dc54f4812ffc753e12a3db23945ae

    • SHA512

      3ad660ac538fb67ef32b8e4bcda5c1983aca9fada3b12357afdd53a0daba38d8def7677f65a91f057834997526ce05295c514e2ae160c5a5895fb3b82ff13e48

    • SSDEEP

      6144:dsGMTIQl2t9xKQzAAOf6yqTmwMCWE3rlPl:dfMTIg2xANYTmJC/Pl

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks