General

  • Target

    f84a51293b5cea4926030930dec0ae73e65dd4ef5f1e6af0c05ab9b285a2bcc2

  • Size

    161KB

  • Sample

    241110-nxmqsawdkn

  • MD5

    03c77922aa6518b2d901bc47cf6a6363

  • SHA1

    23e9a8637e5e7eea61f8cadbaf7a999def416e56

  • SHA256

    f84a51293b5cea4926030930dec0ae73e65dd4ef5f1e6af0c05ab9b285a2bcc2

  • SHA512

    579bc79f9a4aba85763c00e0de26485b5abe03fffbc6688d09d581f1168c10c0cf5dd331506f94bd6b1ba1b7107de57793b60c68460b257c87f5e013571f19e3

  • SSDEEP

    3072:aR2t5rOCz3VGD1PrFuz0AQVBPD2ME7rrwMC+NUWRBFIwuokW5Lm:NHh0DVUWPqrMMTRB4

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

51.89.204.181:22299

Attributes
  • auth_value

    3a050df92d0cf082b2cdaf87863616be

Targets

    • Target

      57435b3537e73c0f03c6dd67256e2b30ab32f673a19f4e0ef4a23844a01dc441.exe

    • Size

      1.2MB

    • MD5

      af8a3624aa77ab4ec744a8da3b94b088

    • SHA1

      59bf40c93a25ae11ddc963e7439a9b4cf2cf7e3b

    • SHA256

      57435b3537e73c0f03c6dd67256e2b30ab32f673a19f4e0ef4a23844a01dc441

    • SHA512

      09f00a45620c7a555e2782431e3f5236106fb5da6efa9cb6779ef2b4cf68240fabb1399be03552bfff3201f3f1a5dcce94660365e3611b576aa41e02a84ca19d

    • SSDEEP

      6144:UTNQESjsYwNtGiRsAOoS4e/3bw5NFnUBFtAl:mNQESja3sWXe/bw9ePAl

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks