General
-
Target
5f46d71351eaa94763c589b62.bin
-
Size
232KB
-
Sample
230630-qvqe1aea8v
-
MD5
10a72a8be16159c0924ff1bd459b4033
-
SHA1
596ed8da5be4b4aa1f9b047feefb54dbc7d2f6e2
-
SHA256
82184fe326360924e97f603427d1ec8c4b1f69e26afc860a177ba0f43d3a8ed8
-
SHA512
6b8a3ff93c59053211a89729e7cabf104fa1cb9a966c3c2fe244d9869440e36ddc6e5bbca0818eb5efc301e3ebc0969f9f42a0d51e21031dc887af689eb92af1
-
SSDEEP
3072:5vwKDBjw19kuBqwfV1B1D6zQfYwNgGQGodWjzZVOD0l+Vm+btR8LkhDIA9F8df6X:/uBqy1zffb5QzNm+btR8ohDFk2xRvfR
Static task
static1
Behavioral task
behavioral1
Sample
dc162f6994b714c3f26ce9f5a6490d7b395ffebfb01e1949720177c3af03d7ab.exe
Resource
win7-20230621-en
Malware Config
Extracted
redline
LogsDiller Cloud (Telegram: @logsdillabot)
146.59.161.7:36019
-
auth_value
3b673ed7d249dbe9bfb73dba76d130a2
Targets
-
-
Target
dc162f6994b714c3f26ce9f5a6490d7b395ffebfb01e1949720177c3af03d7ab.exe
-
Size
350KB
-
MD5
5f46d71351eaa94763c589b62e73591a
-
SHA1
564fb229ba4d5c2a3f159c53b48ae088926e752b
-
SHA256
dc162f6994b714c3f26ce9f5a6490d7b395ffebfb01e1949720177c3af03d7ab
-
SHA512
fd21ab479f6d7ec5f8160e9cab9a7d6f78ceeed57259cab326d51ba23c5000cb103dc764891c68eae10f14fd9f5c956063028300cc56a98c10d9d27edd6f27ee
-
SSDEEP
3072:2E1fl8vhjeB9DFaP4CSox5yUUSvT7bPU/bAEP3WLWlpPKWqx8wAw7qqRAV5jwSnb:FGUPDePmUrU/93WCXKWqx87FwgwSui
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-