General
-
Target
file.exe
-
Size
824KB
-
Sample
230824-vy912afg8w
-
MD5
e978406a3f33ac72c4b8f172eefa22f8
-
SHA1
3eccf927a1e1c5105d23fbb8ec9ba4012d95b19f
-
SHA256
976ce1b513553b55546b110d245377a7c5e661de02b20c9a3c3c2d65c0a7dd52
-
SHA512
2e9aa4ad8f8f07f9ea41b9164c7d34497fe42d55ef6394a93b62d0bfc7f9d2e2917ffac6da5a18c02a4c3b6755246f731fae7b2f408e30e8d4ca3c3107fff7b8
-
SSDEEP
24576:G23OjK5U1a2vjevHHunpE5GAfrMb9pOGzmnc7:Xoa2vjevHHuKJrMyc7
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230824-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
redline
LogsDiller Cloud (Telegram: @logsdillabot)
149.202.0.242:31728
-
auth_value
c2955ed3813a798683a185a82e949f88
Targets
-
-
Target
file.exe
-
Size
824KB
-
MD5
e978406a3f33ac72c4b8f172eefa22f8
-
SHA1
3eccf927a1e1c5105d23fbb8ec9ba4012d95b19f
-
SHA256
976ce1b513553b55546b110d245377a7c5e661de02b20c9a3c3c2d65c0a7dd52
-
SHA512
2e9aa4ad8f8f07f9ea41b9164c7d34497fe42d55ef6394a93b62d0bfc7f9d2e2917ffac6da5a18c02a4c3b6755246f731fae7b2f408e30e8d4ca3c3107fff7b8
-
SSDEEP
24576:G23OjK5U1a2vjevHHunpE5GAfrMb9pOGzmnc7:Xoa2vjevHHuKJrMyc7
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-