General
-
Target
aaefdf3b3457cf7b732597a4ba746a2054d3b28677b18edc3ddb7c6c3d51de9d
-
Size
392KB
-
Sample
230804-yh9l4sea94
-
MD5
9fc415b4c69dc824054a3b43f17dc2c5
-
SHA1
a321e50933c447fd0e6ae869db24731cd0c7d48a
-
SHA256
aaefdf3b3457cf7b732597a4ba746a2054d3b28677b18edc3ddb7c6c3d51de9d
-
SHA512
7c10f3f7dd8efa5017d66475a6887b1d140c48ec2b2b5d3992b369b8d0b022384c6a446bd0d30c424f12e3797340fd0e8bd0b078ecac1b56f56a4d4b129b81ef
-
SSDEEP
6144:svx9EWh2J5mkky32/JlmoIo2T+1bpduZIEk9wGIZ:s59EW4ukky3UNxzpkCjjIZ
Static task
static1
Behavioral task
behavioral1
Sample
aaefdf3b3457cf7b732597a4ba746a2054d3b28677b18edc3ddb7c6c3d51de9d.exe
Resource
win10-20230703-en
Malware Config
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
51.89.201.49:6932
-
auth_value
3a050df92d0cf082b2cdaf87863616be
Targets
-
-
Target
aaefdf3b3457cf7b732597a4ba746a2054d3b28677b18edc3ddb7c6c3d51de9d
-
Size
392KB
-
MD5
9fc415b4c69dc824054a3b43f17dc2c5
-
SHA1
a321e50933c447fd0e6ae869db24731cd0c7d48a
-
SHA256
aaefdf3b3457cf7b732597a4ba746a2054d3b28677b18edc3ddb7c6c3d51de9d
-
SHA512
7c10f3f7dd8efa5017d66475a6887b1d140c48ec2b2b5d3992b369b8d0b022384c6a446bd0d30c424f12e3797340fd0e8bd0b078ecac1b56f56a4d4b129b81ef
-
SSDEEP
6144:svx9EWh2J5mkky32/JlmoIo2T+1bpduZIEk9wGIZ:s59EW4ukky3UNxzpkCjjIZ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-