General

  • Target

    9949399d83510375705f4bef9503ce4ab2c8302cf78ed95adc7b56e2fa4d4d29

  • Size

    139KB

  • Sample

    241109-gnyncssjan

  • MD5

    4111d657b7c3dcd00dd6644ad02aa634

  • SHA1

    38385acaef12e8a23795066529075706c8fbeb4b

  • SHA256

    9949399d83510375705f4bef9503ce4ab2c8302cf78ed95adc7b56e2fa4d4d29

  • SHA512

    24e48b75105eb78667570110f50187de8d7bb8734704aa72386358ece38c4f0fc09ce8a7dd91288e3628719ebb0a21b5055344433a41825872b5ed6b64c3a3da

  • SSDEEP

    3072:aUTlwjnhFfgxXEFElWkpuvkAumyqNwT5D8HH2nPBKl7rcG:XejnhNgxXqEBhcNu0HYKl7V

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

51.89.204.181:22299

Attributes
  • auth_value

    3a050df92d0cf082b2cdaf87863616be

Targets

    • Target

      87517abbcad09f64261b35b8379f5766819749008ca1e146082fccf99872002d.exe

    • Size

      1.4MB

    • MD5

      d4c28033493d42ee0f3504e163185d86

    • SHA1

      e1a5d924878e38334fd2af17fb710d54a8fd1b38

    • SHA256

      87517abbcad09f64261b35b8379f5766819749008ca1e146082fccf99872002d

    • SHA512

      bbed46cd3bf32e2483b08f03c2d1b32da2a47cb48ada189004cae7b9ddfc5858c0bc7aeae4b8781bd00fd580c7328ad23968862fac352708fd9112de7ca88bdf

    • SSDEEP

      6144:ATlRsO3DlYaypWrIFYgj2NQHpg3+K+a6SICMl5WJuh/cn:ATlR6aUlFY+2NKOlICdCcn

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks