General
-
Target
52f76abcdc8c78bb67d40de40a4aed7f5c72e552ac5582cc15ed1d33480a8d4b
-
Size
343KB
-
Sample
240417-qwxwgahh33
-
MD5
c5b19a2cffdeecfce00679640bbc2350
-
SHA1
d8cc55bde435e9d5d2fa6eccf4acb051ce8dc49c
-
SHA256
52f76abcdc8c78bb67d40de40a4aed7f5c72e552ac5582cc15ed1d33480a8d4b
-
SHA512
7cd190f64f1bf64b4860238aefedc744dd2377acde5a2ad10877e36c48101faa5bcda1a5001c819b2c31bec89a60446da2483e699c47aeeb8179baf6caee8dab
-
SSDEEP
6144:npSeXMuSHGb/vPVLw7/UwazStx12BglYtmH240ZDQ5I1nF7xqxQNbo:3XMHGbXPVij1FPH2JZDMkFdquO
Static task
static1
Behavioral task
behavioral1
Sample
a5fa4a9924738f31e1f7d2436d75af6bae105771ec2cac40f07d953880931e8d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
a5fa4a9924738f31e1f7d2436d75af6bae105771ec2cac40f07d953880931e8d.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
5.42.65.68:29093
Targets
-
-
Target
a5fa4a9924738f31e1f7d2436d75af6bae105771ec2cac40f07d953880931e8d.exe
-
Size
374KB
-
MD5
e95081602cb904d9ea3d809724c71a7e
-
SHA1
bbaf6ea75ef068cd28f327ca7c321faeb9019dd0
-
SHA256
a5fa4a9924738f31e1f7d2436d75af6bae105771ec2cac40f07d953880931e8d
-
SHA512
16b1dc915c02babca267573377bc766ca402a8f69f8f4e20526044ff90a00230938dd1926069bec9bc0c3c66ca13b3a9021277e1cf6f09e44b00a53661220815
-
SSDEEP
6144:q+OYiRk78wIxWDP7iECDC1t6qmdFfih1IIddNbiojyWzBs5ZzvU/x3ip6JRfBOCv:DOYOk1SWTnKC1C6fIIddNbiojyMs5Zz6
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Suspicious use of SetThreadContext
-