General
-
Target
c9ca226a2016cda8abc17a88256b09b8.bin
-
Size
259KB
-
Sample
230513-b5hetafb27
-
MD5
bde0be72ce6eb144b5bb68e8846e6d15
-
SHA1
82b41eba78a91086d91e0492d94a756ee1154df6
-
SHA256
890aed15049b649c4d39e64c5331d0612c529cfab7009b3db8f0f197fc7c94a4
-
SHA512
613c380839ffcc6c47cbade9f8a9d5bffbed31450538f21e31d8ff9ba13fab68df9bd39a1d559fee6c4c544fae06effdaed09b9c00d5285a9ecdf0b7120d400d
-
SSDEEP
6144:AxNBasrjp8N1GxINnVOIzA3qv1fJRyGiINotrASSIH:2NB/rjp01npE3qv3QGXCifIH
Static task
static1
Behavioral task
behavioral1
Sample
8a47d16dd380f046459e2fd1ebc636a1bba301d521587cc147b4240de545b20e.exe
Resource
win7-20230220-en
Malware Config
Extracted
redline
LogsDiller Cloud (Telegram: @logsdillabot)
178.33.182.70:18918
-
auth_value
c2955ed3813a798683a185a82e949f88
Targets
-
-
Target
8a47d16dd380f046459e2fd1ebc636a1bba301d521587cc147b4240de545b20e.exe
-
Size
397KB
-
MD5
c9ca226a2016cda8abc17a88256b09b8
-
SHA1
8d9e5449790924430e6c0de8232e46fa97b1dae6
-
SHA256
8a47d16dd380f046459e2fd1ebc636a1bba301d521587cc147b4240de545b20e
-
SHA512
44005217e202fac280d9c3a6a7e63f99bde6a836d29e560143893a7de5f5ff9c516c9aba6ae9af6b27e862a87048259708b8a986a142d35e29a34d5e6937bfe1
-
SSDEEP
6144:6FMJQLLzvijefEGxpUowDUefSHnmqVWRVUAAx2iJLBITOCB8MQhw:6z3zviaEgOowkmqgMLBITTl
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-