General
-
Target
1084-56-0x00000000025C0000-0x00000000025F4000-memory.dmp
-
Size
208KB
-
Sample
230519-l3h9fadc27
-
MD5
3aafefdd3deb3d1f6248df0e5811bab6
-
SHA1
1dca95368e31727b0cd374f4e06769ec868c8ed7
-
SHA256
19e92910c66f6eede2edbacd7825965f0cee8d9367e27401e4972df6e62e0df5
-
SHA512
131c928636e9a65afbaca17826630e3fc3472d4651e3b6b7eef00593e5695e264c94f1c472b532a0b6905a1346baab29597c82207ee9a54af6cb73629fc99a00
-
SSDEEP
3072:gzPLRuCkCBrrAuHOOxaCEflJhL+4FBKf8X3iL8e8hi:EPLRwCw+EflJh+1kX3iL
Behavioral task
behavioral1
Sample
1084-56-0x00000000025C0000-0x00000000025F4000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1084-56-0x00000000025C0000-0x00000000025F4000-memory.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
LogsDiller Cloud (Telegram: @logsdillabot)
178.33.182.70:18918
-
auth_value
c2955ed3813a798683a185a82e949f88
Targets
-
-
Target
1084-56-0x00000000025C0000-0x00000000025F4000-memory.dmp
-
Size
208KB
-
MD5
3aafefdd3deb3d1f6248df0e5811bab6
-
SHA1
1dca95368e31727b0cd374f4e06769ec868c8ed7
-
SHA256
19e92910c66f6eede2edbacd7825965f0cee8d9367e27401e4972df6e62e0df5
-
SHA512
131c928636e9a65afbaca17826630e3fc3472d4651e3b6b7eef00593e5695e264c94f1c472b532a0b6905a1346baab29597c82207ee9a54af6cb73629fc99a00
-
SSDEEP
3072:gzPLRuCkCBrrAuHOOxaCEflJhL+4FBKf8X3iL8e8hi:EPLRwCw+EflJh+1kX3iL
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-