General
-
Target
041cc88cbceb864768d4d0ede0c0f88a.exe
-
Size
402KB
-
Sample
230629-l7xydsde7v
-
MD5
041cc88cbceb864768d4d0ede0c0f88a
-
SHA1
814193713ef7b93b57e7141d86c7aa38a8999c76
-
SHA256
f21c09195ba116e3f43f163fc8132c957d6aba102df96f7822ac9558dd6d279e
-
SHA512
9710d6539a3fd764f05b6bf0b1abe106ffa8857c0185e24cbdd9c27908cb5709ceee15fef4704d6e48b50b049c95086ac50fc4e81de51dcd2cc9552184993409
-
SSDEEP
6144:uDRIz77bNZ2LTDYhDNKUa8r5iZ5EPXx3Y+yUDYeG:uDRy7bNZoYhhKaiZ5YXx31Y
Static task
static1
Behavioral task
behavioral1
Sample
041cc88cbceb864768d4d0ede0c0f88a.exe
Resource
win7-20230621-en
Malware Config
Extracted
redline
LogsDiller Cloud (Telegram: @logsdillabot)
146.59.161.7:36019
-
auth_value
3b673ed7d249dbe9bfb73dba76d130a2
Targets
-
-
Target
041cc88cbceb864768d4d0ede0c0f88a.exe
-
Size
402KB
-
MD5
041cc88cbceb864768d4d0ede0c0f88a
-
SHA1
814193713ef7b93b57e7141d86c7aa38a8999c76
-
SHA256
f21c09195ba116e3f43f163fc8132c957d6aba102df96f7822ac9558dd6d279e
-
SHA512
9710d6539a3fd764f05b6bf0b1abe106ffa8857c0185e24cbdd9c27908cb5709ceee15fef4704d6e48b50b049c95086ac50fc4e81de51dcd2cc9552184993409
-
SSDEEP
6144:uDRIz77bNZ2LTDYhDNKUa8r5iZ5EPXx3Y+yUDYeG:uDRy7bNZoYhhKaiZ5YXx31Y
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-