General
-
Target
9732d4482e2cf4d1685ac60e8ec19a13b24de4851106917fb0c8d8c1b73920da
-
Size
389KB
-
Sample
240326-2qrytaed36
-
MD5
43d0038cbeedc5a57f52f0bea45d99b2
-
SHA1
64d98866b0e6afd1d99dfe717278dd87d94aa098
-
SHA256
9732d4482e2cf4d1685ac60e8ec19a13b24de4851106917fb0c8d8c1b73920da
-
SHA512
af2ebf66f1e3a1e3a12bd4cebeef92d44710fbbc08c9e8bb8bb02e1d22577c9c3adb17ef0f4723f6ffa9ba5bcf31ad1a0901e5cf319964f34acb7e52a1300bb9
-
SSDEEP
6144:+naaTH28oVpMr7mHirmj+Tun3gseL//lv1tMV6l:+naaTHYVp6mGmjcuH6l
Static task
static1
Behavioral task
behavioral1
Sample
9732d4482e2cf4d1685ac60e8ec19a13b24de4851106917fb0c8d8c1b73920da.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9732d4482e2cf4d1685ac60e8ec19a13b24de4851106917fb0c8d8c1b73920da.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
redline
LogsDiller Cloud (Bot: @logsdillabot)
5.42.65.68:29093
Targets
-
-
Target
9732d4482e2cf4d1685ac60e8ec19a13b24de4851106917fb0c8d8c1b73920da
-
Size
389KB
-
MD5
43d0038cbeedc5a57f52f0bea45d99b2
-
SHA1
64d98866b0e6afd1d99dfe717278dd87d94aa098
-
SHA256
9732d4482e2cf4d1685ac60e8ec19a13b24de4851106917fb0c8d8c1b73920da
-
SHA512
af2ebf66f1e3a1e3a12bd4cebeef92d44710fbbc08c9e8bb8bb02e1d22577c9c3adb17ef0f4723f6ffa9ba5bcf31ad1a0901e5cf319964f34acb7e52a1300bb9
-
SSDEEP
6144:+naaTH28oVpMr7mHirmj+Tun3gseL//lv1tMV6l:+naaTHYVp6mGmjcuH6l
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-