General

  • Target

    cc9061f5aa0a3be490e90be334be74e025bc7fd28a55ac3e68aeded57f482e72

  • Size

    1.6MB

  • Sample

    241108-2js8astpfl

  • MD5

    fd60a6d7a8ccbc8bd018def9ead90417

  • SHA1

    679836046c024e1d06d8652f3efd80d00fce4a34

  • SHA256

    cc9061f5aa0a3be490e90be334be74e025bc7fd28a55ac3e68aeded57f482e72

  • SHA512

    6324e63ccc1196a3f38db6a53ebff493fde2e7232d1241903aedda5d8493d613424814384a869c9099c389ecf6255434cb73311bb6ef8241be1ca9327561e21e

  • SSDEEP

    49152:srBq9BM2ObpzQ1tdjkQjR1V0FTF98O7znJTH:yBoepCRjjOFf8O/JTH

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

51.210.137.6:47909

Attributes
  • auth_value

    3a050df92d0cf082b2cdaf87863616be

Targets

    • Target

      5aa72ffbc299f8ebe8ead4e520cd19faa66ab9ef872a0fc38dda11fd76a23373.exe

    • Size

      1.8MB

    • MD5

      d59be142eb273dd2c2475932ea507be9

    • SHA1

      778922a0c3449b856f1b655866fb80542277e4fa

    • SHA256

      5aa72ffbc299f8ebe8ead4e520cd19faa66ab9ef872a0fc38dda11fd76a23373

    • SHA512

      a65cd3061b2533d1cab10df6e7157cce8983fb1b94e30137e9ccb4cb6bad08fab4b587030e5225e17914ae8bab02add30629fd9c872274d34ed69cbdc4c92fce

    • SSDEEP

      49152:V5OSyRh7E/kByJ4g3AVm5c3+12bk7vRDB3VwMylYZRD:V5yRh75W4wAycuQbk1FFwvYv

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks