General

  • Target

    e3d22b92daa4af89fd61612bf763f2986867737e33d46936bc375958294ef227

  • Size

    208KB

  • Sample

    241105-gaqqlawflk

  • MD5

    614e93589030d716950510e5c8b517f2

  • SHA1

    bc64fc1c1f2d1ffdb48d6c36e890e2280be6ee00

  • SHA256

    e3d22b92daa4af89fd61612bf763f2986867737e33d46936bc375958294ef227

  • SHA512

    9a6626f1188e018aafaad2664cff23905d5188fa2a25b804fab5e6298163d8941a3418436fbc48a9b4fca4f75923b5ab1cff6ba74b110d9e5821d2cad08490bc

  • SSDEEP

    3072:MW3s69VvJMzabHEt82BCHJam9UlCQXD/2brWI4+okzBby/8e8hgn:p3s6NMzaBJpK+brWIFdSb

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

51.89.201.49:6932

Attributes
  • auth_value

    3a050df92d0cf082b2cdaf87863616be

Targets

    • Target

      e3d22b92daa4af89fd61612bf763f2986867737e33d46936bc375958294ef227

    • Size

      208KB

    • MD5

      614e93589030d716950510e5c8b517f2

    • SHA1

      bc64fc1c1f2d1ffdb48d6c36e890e2280be6ee00

    • SHA256

      e3d22b92daa4af89fd61612bf763f2986867737e33d46936bc375958294ef227

    • SHA512

      9a6626f1188e018aafaad2664cff23905d5188fa2a25b804fab5e6298163d8941a3418436fbc48a9b4fca4f75923b5ab1cff6ba74b110d9e5821d2cad08490bc

    • SSDEEP

      3072:MW3s69VvJMzabHEt82BCHJam9UlCQXD/2brWI4+okzBby/8e8hgn:p3s6NMzaBJpK+brWIFdSb

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks