General
-
Target
file
-
Size
804KB
-
Sample
230821-jwteqabf62
-
MD5
67445af34314a6aba1f685885a3e2aaf
-
SHA1
1a7cec4106a837a9d31edf92c90ebc3cb2ccd27d
-
SHA256
b154c3d8a7d71c3fd64fb2a3c41e72ad9289dc9b7c905512dc928893a31086b2
-
SHA512
b32475da1358568e6051543878b7ff89b1ade4a9f4860b4e5f66c7e5a3373d3503d440ff6f771b8977e21f48c46a8c36f28ca94d5005c8b1c2efe859fcd07bcf
-
SSDEEP
12288:h472Og6pEAt2NxW7t5dEuPDP1/mUIg7SVxzMAriXujoo/mutndxRFI:O7s6pEAt2NxW7lLNmUIg7SVxotwxRF
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
redline
LogsDiller Cloud (Telegram: @logsdillabot)
149.202.0.242:31728
-
auth_value
c2955ed3813a798683a185a82e949f88
Targets
-
-
Target
file
-
Size
804KB
-
MD5
67445af34314a6aba1f685885a3e2aaf
-
SHA1
1a7cec4106a837a9d31edf92c90ebc3cb2ccd27d
-
SHA256
b154c3d8a7d71c3fd64fb2a3c41e72ad9289dc9b7c905512dc928893a31086b2
-
SHA512
b32475da1358568e6051543878b7ff89b1ade4a9f4860b4e5f66c7e5a3373d3503d440ff6f771b8977e21f48c46a8c36f28ca94d5005c8b1c2efe859fcd07bcf
-
SSDEEP
12288:h472Og6pEAt2NxW7t5dEuPDP1/mUIg7SVxzMAriXujoo/mutndxRFI:O7s6pEAt2NxW7lLNmUIg7SVxotwxRF
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-