General
-
Target
ae940b420c8bf17274af8b7f67b61b3221c73c3e5d05c1d073d47f5a4a9f20ab
-
Size
320KB
-
Sample
240417-p5q9lsga85
-
MD5
3a787699d24dd913146b1379354fdb7d
-
SHA1
dd42c0a5cf8989235aecf89bd636dda642b4e394
-
SHA256
ae940b420c8bf17274af8b7f67b61b3221c73c3e5d05c1d073d47f5a4a9f20ab
-
SHA512
1e32fc685143f9bbb3fe0d100558bc200877e6b46b292936f837a01f4aa3cf08f2c3038af9492dec1a69152f80321a60a6d6d50923a4b1f9c36995a7378d8f79
-
SSDEEP
6144:Rl5+irF7I/5kvgvat5kaW5LIQiRADi7FEDdjA3aiZgpBuj1QRjN/7q50F9JNqB12:RldIhmAaWi2gadnu1SNDz4QV
Static task
static1
Behavioral task
behavioral1
Sample
7d06266d2ba7653d4ea295fa3e1df7a89b3194735e3cc3b5cd2964a3f4d1f730.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7d06266d2ba7653d4ea295fa3e1df7a89b3194735e3cc3b5cd2964a3f4d1f730.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
5.42.65.0:29587
Targets
-
-
Target
7d06266d2ba7653d4ea295fa3e1df7a89b3194735e3cc3b5cd2964a3f4d1f730.exe
-
Size
330KB
-
MD5
e30311e2ce32a32a4de2e7955659e501
-
SHA1
80fce1765598631e51d642bb7191e75eae83bb70
-
SHA256
7d06266d2ba7653d4ea295fa3e1df7a89b3194735e3cc3b5cd2964a3f4d1f730
-
SHA512
f69d7be46b07abe0fd4b0db4f6441a6d29640351bfa3bab09fc3d8ab24ea04afb7b098725d75c4a5d6a6124e89b9d951e0c84f72ca0ec297b9d803defbc2d466
-
SSDEEP
6144:ak6bDrmWtZd6l1btJwCpnKE61TiglfVMsVVg0hf2mBnJR0JlnxOagMsuU+:j6b/mW3dGpKESiGGsVVggf2YnT0Jln8O
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Suspicious use of SetThreadContext
-