General
-
Target
719082dcc3c017e5b675c8b9ec74b6a1.exe
-
Size
1.2MB
-
Sample
230324-hj7wxacg45
-
MD5
719082dcc3c017e5b675c8b9ec74b6a1
-
SHA1
d189e585b338d3ce5d6f0c04e0ce94aa40343c6a
-
SHA256
6a57409b5f4d0ae13167353c059ddf4b9fe7920647a119a70438dae02a35586e
-
SHA512
c72824357f2527917e26dc73d979672299e165b15d3114da66f0fbd4448129cc48487f3079a056af244d5685e847ff9f1e684341c243c7f14572d5ac0626fea5
-
SSDEEP
24576:kTbBv5rUlINj1z+EmdKiTazGSfcElXv8zcAsMVMgSZwU:WBREd3GGSfNpAjpS
Static task
static1
Behavioral task
behavioral1
Sample
719082dcc3c017e5b675c8b9ec74b6a1.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
719082dcc3c017e5b675c8b9ec74b6a1.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
51.210.161.21:36108
-
auth_value
3a050df92d0cf082b2cdaf87863616be
Targets
-
-
Target
719082dcc3c017e5b675c8b9ec74b6a1.exe
-
Size
1.2MB
-
MD5
719082dcc3c017e5b675c8b9ec74b6a1
-
SHA1
d189e585b338d3ce5d6f0c04e0ce94aa40343c6a
-
SHA256
6a57409b5f4d0ae13167353c059ddf4b9fe7920647a119a70438dae02a35586e
-
SHA512
c72824357f2527917e26dc73d979672299e165b15d3114da66f0fbd4448129cc48487f3079a056af244d5685e847ff9f1e684341c243c7f14572d5ac0626fea5
-
SSDEEP
24576:kTbBv5rUlINj1z+EmdKiTazGSfcElXv8zcAsMVMgSZwU:WBREd3GGSfNpAjpS
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-