General
-
Target
1424-56-0x00000000041D0000-0x0000000004204000-memory.dmp
-
Size
208KB
-
Sample
230605-h12q8afg91
-
MD5
d53a8884e634ac2b674c36b4b4d9ee3d
-
SHA1
3e8e769efc7da88be847a9ca2319a7d442019074
-
SHA256
edc14c2284fef0b1f2bca987464bd579dc1b8f10e2ac1a6ff43da1c6a5af8484
-
SHA512
d5ea0b9720954e118950b5783a463bd0328bacc38cdbc133378dff1a576254f24b10f289e6f8b66dadd8490596721787b57e159e73c952f8fff3f3029dba2af9
-
SSDEEP
3072:HubLREuUb3rOuIEfSRmjDmAYyoWIvJ4FgbfHM8e8hH:ObLR+WEqRmOAHoWIvJrvM
Behavioral task
behavioral1
Sample
1424-56-0x00000000041D0000-0x0000000004204000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1424-56-0x00000000041D0000-0x0000000004204000-memory.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
LogsDiller Cloud (Telegram: @logsdillabot)
147.135.231.58:23368
-
auth_value
c2955ed3813a798683a185a82e949f88
Targets
-
-
Target
1424-56-0x00000000041D0000-0x0000000004204000-memory.dmp
-
Size
208KB
-
MD5
d53a8884e634ac2b674c36b4b4d9ee3d
-
SHA1
3e8e769efc7da88be847a9ca2319a7d442019074
-
SHA256
edc14c2284fef0b1f2bca987464bd579dc1b8f10e2ac1a6ff43da1c6a5af8484
-
SHA512
d5ea0b9720954e118950b5783a463bd0328bacc38cdbc133378dff1a576254f24b10f289e6f8b66dadd8490596721787b57e159e73c952f8fff3f3029dba2af9
-
SSDEEP
3072:HubLREuUb3rOuIEfSRmjDmAYyoWIvJ4FgbfHM8e8hH:ObLR+WEqRmOAHoWIvJrvM
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-