General

  • Target

    4055a6113ddad0ab1e7ea173d97e9b86d89c80104eb6a7b59b4e50dddce8684e

  • Size

    1.7MB

  • Sample

    241111-lwb7js1lfq

  • MD5

    371da32c92c7823216d00409769fce25

  • SHA1

    205e6fbd0f96951141e04b2364a9ab486cefdd20

  • SHA256

    4055a6113ddad0ab1e7ea173d97e9b86d89c80104eb6a7b59b4e50dddce8684e

  • SHA512

    948fe86182d73ef2a09d25e7ea67e6f90fcd7f41829c37d41c23705c512981f6a26b895f445dff34c1a2e09bc4b4514c43de4bb124113f5fe4920cdfd8120489

  • SSDEEP

    49152:n+sHdhtJYk989f88kfmPCkmw+fQbY17gec3i8kB:n3Hdh8k98988kfmPCkmw+fQigec3PI

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

51.210.137.6:47909

Attributes
  • auth_value

    3a050df92d0cf082b2cdaf87863616be

Targets

    • Target

      90d635817607ef7037d5f3c3d516cbce989155590946c088cabb9f80bf7fbfeb.exe

    • Size

      1.8MB

    • MD5

      d511992136c2cda00b468ce9e30b0cf5

    • SHA1

      e947bcc2b9e603392841fafe4fcf4c2e23fa42da

    • SHA256

      90d635817607ef7037d5f3c3d516cbce989155590946c088cabb9f80bf7fbfeb

    • SHA512

      dbd145f438f1b07c2051437c9c2dfff3cad2d5402abbd52df4ffc5d06b4aa6c2628bf62f3f6dc300079170adf3fc7543316eff66f4a62d13a2fd8760945d4a2d

    • SSDEEP

      49152:V5OzHCcQhi/kByJ4g3AVm5c3+12bk7vRDB3VwMylYZRL:V5ph3W4wAycuQbk1FFwvYf

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks