General

  • Target

    97f99c600f43998247e9c41ecb335c6fadc5351df9c2e0c16d9bc6983637589c

  • Size

    208KB

  • Sample

    241111-bdh72ayfmm

  • MD5

    519933306abfa01459ec8ab29a75d265

  • SHA1

    bdd4ed51cd72f1d9a231fd24f8e783580127d554

  • SHA256

    97f99c600f43998247e9c41ecb335c6fadc5351df9c2e0c16d9bc6983637589c

  • SHA512

    64e8d2a955093bab2a1044cfd6975feb13c32b2309b5e69a15378aff36d2b9b13b414171ec5705db6e36a4b2924b75f47e731f6dabf90846c1d844bca7637816

  • SSDEEP

    3072:gzPLRuCkCBrrAuHOOxaCEflJhL+4FBKf8X3iL8e8hiD:EPLRwCw+EflJh+1kX3iLt

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

178.33.182.70:18918

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Targets

    • Target

      97f99c600f43998247e9c41ecb335c6fadc5351df9c2e0c16d9bc6983637589c

    • Size

      208KB

    • MD5

      519933306abfa01459ec8ab29a75d265

    • SHA1

      bdd4ed51cd72f1d9a231fd24f8e783580127d554

    • SHA256

      97f99c600f43998247e9c41ecb335c6fadc5351df9c2e0c16d9bc6983637589c

    • SHA512

      64e8d2a955093bab2a1044cfd6975feb13c32b2309b5e69a15378aff36d2b9b13b414171ec5705db6e36a4b2924b75f47e731f6dabf90846c1d844bca7637816

    • SSDEEP

      3072:gzPLRuCkCBrrAuHOOxaCEflJhL+4FBKf8X3iL8e8hiD:EPLRwCw+EflJh+1kX3iLt

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks