General
-
Target
5f308a9da30dbe668bd1e2e2f7067e8812d67f14703d4b24c47412bfe23f4a8b
-
Size
473KB
-
Sample
240212-fkrj7sdg36
-
MD5
abfcb597aba704faa71413f1c113981d
-
SHA1
823fc94f17e7981098f15ebcc05b6decc3faf716
-
SHA256
5f308a9da30dbe668bd1e2e2f7067e8812d67f14703d4b24c47412bfe23f4a8b
-
SHA512
899001c907d25acd0fb47457b7ea6366831de5c052ef69635cb8ff391289fdf16074c1e9ebbd770f93877eb904a4bf481f28442f69a96bebc10fcbb00d85b2ec
-
SSDEEP
6144:7DKW1Lgbdl0TBBvjc/CoMKypduBiXa3p5+jDgYHHRo5z9KtmDaimb/u10FcC+FYg:Ph1Lk70TnvjceK+q3p58DnRuzLAAF/BZ
Static task
static1
Behavioral task
behavioral1
Sample
5f308a9da30dbe668bd1e2e2f7067e8812d67f14703d4b24c47412bfe23f4a8b.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5f308a9da30dbe668bd1e2e2f7067e8812d67f14703d4b24c47412bfe23f4a8b.exe
Resource
win10-20231215-en
Malware Config
Extracted
redline
LogsDiller Cloud (Telegram: @logsdillabot)
5.42.65.38:46185
Targets
-
-
Target
5f308a9da30dbe668bd1e2e2f7067e8812d67f14703d4b24c47412bfe23f4a8b
-
Size
473KB
-
MD5
abfcb597aba704faa71413f1c113981d
-
SHA1
823fc94f17e7981098f15ebcc05b6decc3faf716
-
SHA256
5f308a9da30dbe668bd1e2e2f7067e8812d67f14703d4b24c47412bfe23f4a8b
-
SHA512
899001c907d25acd0fb47457b7ea6366831de5c052ef69635cb8ff391289fdf16074c1e9ebbd770f93877eb904a4bf481f28442f69a96bebc10fcbb00d85b2ec
-
SSDEEP
6144:7DKW1Lgbdl0TBBvjc/CoMKypduBiXa3p5+jDgYHHRo5z9KtmDaimb/u10FcC+FYg:Ph1Lk70TnvjceK+q3p58DnRuzLAAF/BZ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
XMRig Miner payload
-
Creates new service(s)
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Stops running service(s)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-