General

  • Target

    ud8qQSCc7kEdZKzblmZWqRhCfNo79m7T[1]

  • Size

    293KB

  • Sample

    241229-xxrjeawkbj

  • MD5

    0f5ecb31cef6ba3cff45230177f5fa63

  • SHA1

    f1e20bdd923cac2cfb35588b3aa0070f5dddf9a2

  • SHA256

    397d2b083efcbf8e2fee9f8565c96c16eba1f24f53755d66207128eb94dd62f5

  • SHA512

    a4d6265691dd15b26d872b97ae884cf2ccbfc6195d8ad5b41cb29e2a3384aa247bd46c060303646d7458c690f20b36afa9442e9654a7f0cdc837b792654ccbb4

  • SSDEEP

    6144:FvcunIxxkYbknbXys1jaA0bNRRULSJ9g5GWNE6dJTaqWf:F/n2xkYqyfAszyc9g5GuJ+qW

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

178.33.182.70:18918

Attributes
  • auth_value

    c2955ed3813a798683a185a82e949f88

Targets

    • Target

      ud8qQSCc7kEdZKzblmZWqRhCfNo79m7T[1]

    • Size

      293KB

    • MD5

      0f5ecb31cef6ba3cff45230177f5fa63

    • SHA1

      f1e20bdd923cac2cfb35588b3aa0070f5dddf9a2

    • SHA256

      397d2b083efcbf8e2fee9f8565c96c16eba1f24f53755d66207128eb94dd62f5

    • SHA512

      a4d6265691dd15b26d872b97ae884cf2ccbfc6195d8ad5b41cb29e2a3384aa247bd46c060303646d7458c690f20b36afa9442e9654a7f0cdc837b792654ccbb4

    • SSDEEP

      6144:FvcunIxxkYbknbXys1jaA0bNRRULSJ9g5GWNE6dJTaqWf:F/n2xkYqyfAszyc9g5GuJ+qW

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks