General
-
Target
file
-
Size
377KB
-
Sample
230902-zg8h4afg64
-
MD5
c66bc87ae6c065515d4875469ade7e11
-
SHA1
f9da08fc89f8b782640bd5f6ff4e11610dbc1c09
-
SHA256
1f384673e558bafe76468a6ba5eff872c5fbef115dd509c6c2852562a47a2ef7
-
SHA512
fb9c4125bcfa0feb5f3bebfc3f3d46142f5351afc28f76fe961a10deae0583024ca480279772754d45c4133822eb1d1b294ff8145ccc7d59a5aa7c688921dc45
-
SSDEEP
6144:h08vfHJfjmufItYYFrIPU88CcRAOLHSdG65FPvIDLHCro0y:h08vVjmufI+YMgVHSdG65RIviU0y
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230831-en
Malware Config
Extracted
redline
LogsDiller Cloud (Telegram: @logsdillabot)
149.202.0.242:31728
-
auth_value
c2955ed3813a798683a185a82e949f88
Targets
-
-
Target
file
-
Size
377KB
-
MD5
c66bc87ae6c065515d4875469ade7e11
-
SHA1
f9da08fc89f8b782640bd5f6ff4e11610dbc1c09
-
SHA256
1f384673e558bafe76468a6ba5eff872c5fbef115dd509c6c2852562a47a2ef7
-
SHA512
fb9c4125bcfa0feb5f3bebfc3f3d46142f5351afc28f76fe961a10deae0583024ca480279772754d45c4133822eb1d1b294ff8145ccc7d59a5aa7c688921dc45
-
SSDEEP
6144:h08vfHJfjmufItYYFrIPU88CcRAOLHSdG65FPvIDLHCro0y:h08vVjmufI+YMgVHSdG65RIviU0y
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-