General

  • Target

    f3dfc24f465166d35c26f23c30d4d9da5ecf5fdab39dbb01058470e22ab17886

  • Size

    2.0MB

  • Sample

    241108-1tgftatkaj

  • MD5

    0172f0c47b1b4aa37dcd142d03b1d790

  • SHA1

    a817fae7d09c74e3a2360a1af912541e492b41b5

  • SHA256

    f3dfc24f465166d35c26f23c30d4d9da5ecf5fdab39dbb01058470e22ab17886

  • SHA512

    ca4e12cf117485c634f73a62433a05c05313cac6d8dc472cabf9edbce01d79d8f0c980af0edd34d3ff408ac9f1c0308550fa9c1b9b4fac4fc3373264149f8d94

  • SSDEEP

    49152:wseacOlfRgp0tCGk1zJ09b3Us7fb0gNZ0btYoRY1DWjJb:xVflfB0GQk3HjHNMY3il

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

51.210.137.6:47909

Attributes
  • auth_value

    3a050df92d0cf082b2cdaf87863616be

Targets

    • Target

      83c239daead7fd351924f1580a026cc9c93115adbd9e992a1c65deabbe2701b4.exe

    • Size

      2.2MB

    • MD5

      bda80c569715cb4e427f9408b389238a

    • SHA1

      c1982d58ce154872aced5460cd88b106dfeaa6f7

    • SHA256

      83c239daead7fd351924f1580a026cc9c93115adbd9e992a1c65deabbe2701b4

    • SHA512

      ee31887687504525cfe9b0ac9e079a396ba92819bdfca2eb5259bea8b900a762cf58630cd19dc2fefbffa5253a30344691438cd3d344086ef337247f2247411d

    • SSDEEP

      49152:V5Oxg/TFlCpM/CWKNdDgQbHbJwzF00nVLqk6FzreoZo:V5FFlCi/n4mc7M00nVGkgzrnZo

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks