General

  • Target

    1023fd71dd03144d53a2f27ed8042a11e846a6cfeded2cd418290b91631ed7f2

  • Size

    221KB

  • Sample

    241109-s6fq2swnas

  • MD5

    20c9dd06975042983be9eefa9bcb0e9f

  • SHA1

    415e4240596d0093bdc9cdfcdefaf2ab3afa494d

  • SHA256

    1023fd71dd03144d53a2f27ed8042a11e846a6cfeded2cd418290b91631ed7f2

  • SHA512

    7d16b759fb203ea29a02f82f8016925cdc08c9888a5ab54cec648a5dff3fa8f82e9cbf0b3f61c29592353ca738b27657166a317abfbd32d35323d20d6866fabd

  • SSDEEP

    3072:5FsvbkUZrLnLT1jLf6XbevvUNtZXRPqUIHr2IVddboOnEu89Tu+hG:SnrTLTJGrOvUNnl3IHr2I7Jqu895E

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

149.202.8.114:26642

Attributes
  • auth_value

    3a050df92d0cf082b2cdaf87863616be

Targets

    • Target

      42f569feb9d6fc7561953999288ab6241dd8825c1a9ba2e7f268d5f47c612da8.exe

    • Size

      348KB

    • MD5

      e4f8f0a91c597b50889f5cc55394efd0

    • SHA1

      aee0095eda93e3f1ecaf816e77e9031b8a20fd4d

    • SHA256

      42f569feb9d6fc7561953999288ab6241dd8825c1a9ba2e7f268d5f47c612da8

    • SHA512

      6fd704ef7d903b72546e195572876f4122b4953b7088cb1136b565b509c4e22675b48147f9567c36117f097b44ef80d7b5378dc4acc5f7ee3ddfbb79cd8f197a

    • SSDEEP

      6144:R20gvpJjSqh3wn5PCLFGJ5MiFPLCcMRyOB6Bwnvh:U08PjS2Ep3lFlMRPQBcvh

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.