General

  • Target

    5197def97c9d6e3f9c0e55f4a91a424ece5a89d4882a0d413a9260123010ec4c

  • Size

    425KB

  • Sample

    241121-xs172szjar

  • MD5

    867db3f60c59188cb4baf8a5aa399752

  • SHA1

    64a62a163ef37dc75601aaa3a9b1459f6972ddd1

  • SHA256

    5197def97c9d6e3f9c0e55f4a91a424ece5a89d4882a0d413a9260123010ec4c

  • SHA512

    f9e6ab200331855e4686abe63cac501e6965fd4a80b26fbbeb70875500e9f0733187c5534e22309ef31cf8fc017f07cf1bd029dd2e093af57651349e8a015f45

  • SSDEEP

    6144:UnBevYGqhRcp5ke929s5gGQJgRCe7e4nY9bTCn:+AYGqhap5ke97yoRfe4nqvO

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

5.42.65.68:29093

Targets

    • Target

      5197def97c9d6e3f9c0e55f4a91a424ece5a89d4882a0d413a9260123010ec4c

    • Size

      425KB

    • MD5

      867db3f60c59188cb4baf8a5aa399752

    • SHA1

      64a62a163ef37dc75601aaa3a9b1459f6972ddd1

    • SHA256

      5197def97c9d6e3f9c0e55f4a91a424ece5a89d4882a0d413a9260123010ec4c

    • SHA512

      f9e6ab200331855e4686abe63cac501e6965fd4a80b26fbbeb70875500e9f0733187c5534e22309ef31cf8fc017f07cf1bd029dd2e093af57651349e8a015f45

    • SSDEEP

      6144:UnBevYGqhRcp5ke929s5gGQJgRCe7e4nY9bTCn:+AYGqhap5ke97yoRfe4nqvO

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks