General

  • Target

    7331508715d63967791fc154b004bd5e5839560c13a9a245d4764ea2d256b311

  • Size

    2.0MB

  • Sample

    241110-l5hqpaxqaj

  • MD5

    eef2f1ef85a876a62e84e42f0838a0ec

  • SHA1

    23034ddf0a664520c20a62d01ceeeea239a82a60

  • SHA256

    7331508715d63967791fc154b004bd5e5839560c13a9a245d4764ea2d256b311

  • SHA512

    62a510a8f4db6c14dd942a2dee5e0374431e8ee2328a9a2b3f03e8cdf5d46bb840dd862c1a7ff26c07993a0584811e2611a1f06242df5fb88a08fc261993868b

  • SSDEEP

    49152:2uNfyTISADfA7v8ygD4DA+adwL/64yFE3tfv78+oeHlsun2qTHBCR/Q:2uJwGbUxDA4eStfboeH7nxYR/Q

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

51.89.207.166:47909

Attributes
  • auth_value

    3a050df92d0cf082b2cdaf87863616be

Targets

    • Target

      25480dc89d202c2d696d27081d6e965e4278a7191f7cb732520535cecbb8d44c.exe

    • Size

      2.1MB

    • MD5

      dac6eda1fe997400f98cebc36aa13301

    • SHA1

      4c589bbaa0ac59da4060db5452cc85f69aaa81f4

    • SHA256

      25480dc89d202c2d696d27081d6e965e4278a7191f7cb732520535cecbb8d44c

    • SHA512

      2f088a83f4ea6836b4bfbb56e19942ecaa513915044e630dd2b08b023080a94eefb53c3fcea4c4a662fd8825a1eb90b47ab27e441f2b5b460b8f4f170b121371

    • SSDEEP

      49152:V5Oaj/gtjDQypipWLn2zFScR+DOeQEitnYb1m8whw:V5nj/gaypismN+DhVitnYm8z

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks