General
-
Target
3bbdfbcc0bf3dddbd6e8706113d81a36.bin
-
Size
390KB
-
Sample
231127-b3al7ade7s
-
MD5
3b8b3cad916d41dd1de193b9df43b60b
-
SHA1
9bbd2fd9145f3e744c5fb1bdaf5f663e3e99679f
-
SHA256
9c0aa9652d9540e44e968c0c8076ee5c544fd9cc75a7c540ff3f69c4d1509ed2
-
SHA512
046ceb38197585bdb37aac29bd8302b72fbf61e6cc1044c8e1024fd50c608d82cdec0e3be4d634e38fe62f78c6ec57e043c9e7bb592533264eb3031864606c54
-
SSDEEP
6144:eZcbjTvq299qak1Rwu0A6szFX4ojQF4zOJhiM7CqHkf643GOBq9Ab:eZ2v3k1RSrlFSIhRBkf9GOBq9I
Static task
static1
Behavioral task
behavioral1
Sample
f641a3e31afa3b0502d4490f22bb56b480f8a50a45dd38e41d53370d325943a9.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
f641a3e31afa3b0502d4490f22bb56b480f8a50a45dd38e41d53370d325943a9.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
redline
LogsDiller Cloud (Telegram: @logsdillabot)
194.49.94.181:40264
Targets
-
-
Target
f641a3e31afa3b0502d4490f22bb56b480f8a50a45dd38e41d53370d325943a9.exe
-
Size
1.1MB
-
MD5
3bbdfbcc0bf3dddbd6e8706113d81a36
-
SHA1
119bf65626c051a451af1d1d1bc4e1b3986ab052
-
SHA256
f641a3e31afa3b0502d4490f22bb56b480f8a50a45dd38e41d53370d325943a9
-
SHA512
912e18af291fe3150c94d3a3701de30335755ca61afdc6969370b2c13f3ecdbe66f54cfdd21dc7aa91e9a0199ece370e266a8472088c4a03286491d565f0e263
-
SSDEEP
12288:cQYUdZzN0OFYvMeTVRq6TFXJdzIEKJGnaQXiugklpJPK4lopDlQFeJ:3dZh0OFYvMeTVRfXcdJG5hevM8
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-