General

  • Target

    1023fd71dd03144d53a2f27ed8042a11e846a6cfeded2cd418290b91631ed7f2

  • Size

    221KB

  • Sample

    241109-s6fq2swnas

  • MD5

    20c9dd06975042983be9eefa9bcb0e9f

  • SHA1

    415e4240596d0093bdc9cdfcdefaf2ab3afa494d

  • SHA256

    1023fd71dd03144d53a2f27ed8042a11e846a6cfeded2cd418290b91631ed7f2

  • SHA512

    7d16b759fb203ea29a02f82f8016925cdc08c9888a5ab54cec648a5dff3fa8f82e9cbf0b3f61c29592353ca738b27657166a317abfbd32d35323d20d6866fabd

  • SSDEEP

    3072:5FsvbkUZrLnLT1jLf6XbevvUNtZXRPqUIHr2IVddboOnEu89Tu+hG:SnrTLTJGrOvUNnl3IHr2I7Jqu895E

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

149.202.8.114:26642

Attributes
  • auth_value

    3a050df92d0cf082b2cdaf87863616be

Targets

    • Target

      42f569feb9d6fc7561953999288ab6241dd8825c1a9ba2e7f268d5f47c612da8.exe

    • Size

      348KB

    • MD5

      e4f8f0a91c597b50889f5cc55394efd0

    • SHA1

      aee0095eda93e3f1ecaf816e77e9031b8a20fd4d

    • SHA256

      42f569feb9d6fc7561953999288ab6241dd8825c1a9ba2e7f268d5f47c612da8

    • SHA512

      6fd704ef7d903b72546e195572876f4122b4953b7088cb1136b565b509c4e22675b48147f9567c36117f097b44ef80d7b5378dc4acc5f7ee3ddfbb79cd8f197a

    • SSDEEP

      6144:R20gvpJjSqh3wn5PCLFGJ5MiFPLCcMRyOB6Bwnvh:U08PjS2Ep3lFlMRPQBcvh

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks