General
-
Target
44e3698201a47d052fcfce1dd5acab852689853fefbf2db30abc3efce47a7117
-
Size
324KB
-
Sample
240417-q9njysag58
-
MD5
f3fd819cedfa9076db5988b857c735c8
-
SHA1
b90d6c074ddeaa4171588d2d042fdb5dba5dc7e9
-
SHA256
44e3698201a47d052fcfce1dd5acab852689853fefbf2db30abc3efce47a7117
-
SHA512
e5bd0789e10c4b567c33814012afa17e6fe94cb6a8f466cdcb594537e751c92e9a0e74a92673443f0dc6e647fffb59e07362f553ead670cb1ba623dcdc0b2fbb
-
SSDEEP
6144:Rs22BX3iA5ZgwFJna661piNEJDu89RT1owRX1EkHvD4cVy2Bo/H7hb:RsJBiCFJn+pCSTmwRXukHvscVy2Bo/Ht
Static task
static1
Behavioral task
behavioral1
Sample
510b869c94a97119300b01538e77f25986d22180cfa41766beb7741bd5fcb7e7.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
510b869c94a97119300b01538e77f25986d22180cfa41766beb7741bd5fcb7e7.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
5.42.65.68:29093
Targets
-
-
Target
510b869c94a97119300b01538e77f25986d22180cfa41766beb7741bd5fcb7e7.exe
-
Size
340KB
-
MD5
8cdd41551a6610b0fedd52ba60de3609
-
SHA1
5657cc270ea93c78dc31701e615b6ee3402da7d9
-
SHA256
510b869c94a97119300b01538e77f25986d22180cfa41766beb7741bd5fcb7e7
-
SHA512
dc18a81d0318cb1530fd3e1170e22d203d89da3fe7faea43ffc99d440943c0432b9311c18e875c6457ddab815877b3cc7c738e15c727af6c663c10cd9c8eb161
-
SSDEEP
6144:Rz3byDV0ryw+jcvGYqX6811Ok8qBVgfaHjmUWIAUqhaX8WWqNUHMhyFdsac:Rz3byJ4yw+wVL811l8qBVjWO3XZHqHMW
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Suspicious use of SetThreadContext
-