General
-
Target
e7ecb6c33c0e9af31d12e1dcf298722ec4aabad5998de95bcd1da8ea0020fccb
-
Size
175KB
-
Sample
220926-ab3yzshggl
-
MD5
6db80d8618208c7a34158a16dd38b200
-
SHA1
18620fdd7429931706a399e4fd27d3d2f7c39cc8
-
SHA256
e7ecb6c33c0e9af31d12e1dcf298722ec4aabad5998de95bcd1da8ea0020fccb
-
SHA512
d0e42c16106ede5b661e39b3504916c40a813eef6df244b6b93880342e2972dbef7f72c9052444858a697954a8a833686ee956f7ed3e6503b871833b78dbf7db
-
SSDEEP
3072:yFNr4ZZCzCh8z5F552J1LnxooYC/imRYYBCmeVnu5x:fuC02Jtp1/i/
Static task
static1
Behavioral task
behavioral1
Sample
e7ecb6c33c0e9af31d12e1dcf298722ec4aabad5998de95bcd1da8ea0020fccb.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
redline
LogsDiller Cloud (TG: @mr_golds)
77.73.134.27:7161
-
auth_value
4b2de03af6b6ac513ac597c2e6c1ad51
Targets
-
-
Target
e7ecb6c33c0e9af31d12e1dcf298722ec4aabad5998de95bcd1da8ea0020fccb
-
Size
175KB
-
MD5
6db80d8618208c7a34158a16dd38b200
-
SHA1
18620fdd7429931706a399e4fd27d3d2f7c39cc8
-
SHA256
e7ecb6c33c0e9af31d12e1dcf298722ec4aabad5998de95bcd1da8ea0020fccb
-
SHA512
d0e42c16106ede5b661e39b3504916c40a813eef6df244b6b93880342e2972dbef7f72c9052444858a697954a8a833686ee956f7ed3e6503b871833b78dbf7db
-
SSDEEP
3072:yFNr4ZZCzCh8z5F552J1LnxooYC/imRYYBCmeVnu5x:fuC02Jtp1/i/
-
Detects Smokeloader packer
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-