General
-
Target
d11e4a59082d53abad2766a4c7da2c83.bin
-
Size
1.8MB
-
Sample
230328-cwsd4aad41
-
MD5
86ee4ef0582fd7f23e1e1cdfc87f0661
-
SHA1
a2da13c7f86732d3cba9e72bf6dc24b83a695005
-
SHA256
46cc4ae74168aa070c0a88b89c1adc677a6f9bde89b1cb4a4dab5633839cf9ac
-
SHA512
567abd778a315a2593785894e6ad7f670b1aed1bf32e3ab09919f34d72a2fdd3b0aa20d43fc7c1e7368a01d13dde6703c079a52eb4aa50c25be7cc956ccada96
-
SSDEEP
49152:p5PuE2SAqCpvchhBVUHKmJ+abMDKbLdrb675mue8m2:pduE2hLcHBCHsabMKb67k4
Static task
static1
Behavioral task
behavioral1
Sample
cd7d654995db0f917d4c7d694c4ec2698eb47ee8702774ed3d9f0603cae3f8e4.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
cd7d654995db0f917d4c7d694c4ec2698eb47ee8702774ed3d9f0603cae3f8e4.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
LogsDiller Cloud (Telegram: @logsdillabot)
51.210.161.21:36108
-
auth_value
c2955ed3813a798683a185a82e949f88
Targets
-
-
Target
cd7d654995db0f917d4c7d694c4ec2698eb47ee8702774ed3d9f0603cae3f8e4.exe
-
Size
1.9MB
-
MD5
d11e4a59082d53abad2766a4c7da2c83
-
SHA1
e4959411b51690dbda4b9132a41e564521491b76
-
SHA256
cd7d654995db0f917d4c7d694c4ec2698eb47ee8702774ed3d9f0603cae3f8e4
-
SHA512
23cc4bbe50668fcfcc0ccb6b2cf0f6a710a0e7d4cf53c256410b585c42bbd172ad06653393b7986afbb850fd0d34cdccd91810b7582b9c6081166aa933d970cf
-
SSDEEP
49152:V5O+qBxAR65Lnt4ZPmN24wBU/VWGOVblDNZhd:V5CBxARCWG0blThd
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-