General
-
Target
1f42845cc77788cdff450881958e68a4.bin
-
Size
249KB
-
Sample
230722-bgkj9shc78
-
MD5
bb043e16ad236df89eac1367b6f6a2f0
-
SHA1
8525e5631385b24c2be65895cfd1e3f2a523af50
-
SHA256
ef4fc22bbe8f8d8a2ab1c1b4cffc6eb001f690223d146c62977374e23701a741
-
SHA512
7b68bf7554cee63577d76de0fdf1fac9a4454c3a099054bbc9faf3ea445b27a3e7873532d2fc887fbfe7a4372e62bcdd113fcf0a4c2e7aa6806e477ae1dc89cd
-
SSDEEP
6144:pnnj19NO5yDlRy3WVvDPFfekHi/BRRts9pSY351qc:Fjj8ilXvDPFf+ZRU9pp7qc
Static task
static1
Behavioral task
behavioral1
Sample
3fcdecef118704af028e93d5e5624849f86bd6b9af7f67e226675accc5ed44ac.exe
Resource
win7-20230712-en
Malware Config
Extracted
redline
LogsDiller Cloud (Telegram: @logsdillabot)
178.32.90.250:29608
-
auth_value
c2955ed3813a798683a185a82e949f88
Targets
-
-
Target
3fcdecef118704af028e93d5e5624849f86bd6b9af7f67e226675accc5ed44ac.exe
-
Size
395KB
-
MD5
1f42845cc77788cdff450881958e68a4
-
SHA1
4c9dcbb076b6da2f49ac5d9f8f20aa2c1d428169
-
SHA256
3fcdecef118704af028e93d5e5624849f86bd6b9af7f67e226675accc5ed44ac
-
SHA512
f87d1884ba6770040aa6485aa488d7e42fe4f10ad856245aeebe3d0bf7383f9e23cb40ef593e3a7c600454fc3685ff252930988a09d49cb3dd23b53e858b832f
-
SSDEEP
3072:OkibvLmLAvc8bH+66gUljGecuHXacRsfeHlLCpeQdc6TXXLiGuLTTLkckC5WL6T:UjCLAbLovcrcBcpesPXXLiGYWRUySm
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-