General

  • Target

    d0ae77f27fe071e72ea2653c350e5c01e5aaf04450817cd106c4e6fd5d1c6416

  • Size

    2.0MB

  • Sample

    241108-b9kqqs1qht

  • MD5

    f02af2977f11ac34ab91c03193f4b777

  • SHA1

    cfa8dca501eac7d264e745205f779fc26a752f79

  • SHA256

    d0ae77f27fe071e72ea2653c350e5c01e5aaf04450817cd106c4e6fd5d1c6416

  • SHA512

    3bfd3e6560704f5827c5f90dede6716a9472ec2e8bfb7e278715dfa0b2b483ce2790a6ab587bdc4fdac0b8af11564b047c0e7231027452efdd35e2edc9a08094

  • SSDEEP

    49152:/nLvY2rpJbcTP6wyGxXdjmMl2CH+UVFhaY2j7T3lbN+x7oue+qN:/LQ2VJbcTCZGxXdTECgj7T3GdbqN

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

51.210.137.6:47909

Attributes
  • auth_value

    3a050df92d0cf082b2cdaf87863616be

Targets

    • Target

      f7a1329e5d2d787c17e5357dfe8242f14dc9e1faf5981a1a4d9d8d1d6511f9ff.exe

    • Size

      2.2MB

    • MD5

      a7fadc5ffccd272e1f3e5dc1717926de

    • SHA1

      d7ec968dbd537158f91b3493fd5f6657e7572836

    • SHA256

      f7a1329e5d2d787c17e5357dfe8242f14dc9e1faf5981a1a4d9d8d1d6511f9ff

    • SHA512

      a297600ba51c2ffa19ddcf0183a949393ea138240cb404ad38b4f90aaaf2dbec2cc8e4cc3f32678ae01e65653f18d91782fde4e3f54789c161986f2561d981d7

    • SSDEEP

      49152:V5OXoeI6Fye8Aivbktejn/dGiGf/vkADafh2KdOTD5Q1f:V5Youevbk2ngiwFafhLOT9Q1

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks