General
-
Target
abc3887732b42b2c1205bab8308fd696.bin
-
Size
230KB
-
Sample
230517-btdbqadc68
-
MD5
e2b3112dacb4bd5c3c4d9773ed57ffac
-
SHA1
8a168c34521c66cb4f963683913c73e0041b2544
-
SHA256
b32df73e14e2581015843aefa56ff5da061668420e71438853a6dd3b92e78f16
-
SHA512
8bb45cb5cd11fd63de5077bdfbac07ccb7264239883e624577c6f1e7e7ec993a6b212acede9031c538665ff0b734caa2c30e06acd1bf5a13b72ef8ee5f10e0bf
-
SSDEEP
6144:z8lxcvEwtcYFE45092WYEL01TUEgK/GI0rQ0QAdO/CYOGzN3H:z8l+JOYFt09PHwtpOI0rQGy3zhH
Static task
static1
Behavioral task
behavioral1
Sample
cd255ffa7973cee8e0db0cdc9959a616ced95e020a8b92ad503ea309425de033.exe
Resource
win7-20230220-en
Malware Config
Extracted
redline
LogsDiller Cloud (Telegram: @logsdillabot)
178.33.182.70:18918
-
auth_value
c2955ed3813a798683a185a82e949f88
Targets
-
-
Target
cd255ffa7973cee8e0db0cdc9959a616ced95e020a8b92ad503ea309425de033.exe
-
Size
323KB
-
MD5
abc3887732b42b2c1205bab8308fd696
-
SHA1
eafe72d8c7df39bbb47a56e87f2a5d3e7fd90fd8
-
SHA256
cd255ffa7973cee8e0db0cdc9959a616ced95e020a8b92ad503ea309425de033
-
SHA512
bcd3eb98c6d98d118886ad1caf026dc7d659be5a0eaa149601e4eb6b2f1a6875d894ad6cda837faaa8ac419e96793ba0ec260785e318ca44d487c0e664c1243e
-
SSDEEP
6144:NgBWCEC1rnI6nuUIyDyaWQ7akcyMzJhuIUvgKZ:iBWCEC5fLuaWQ7akcyoUf
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-