General
-
Target
70832e266e86d980fbe532bc2a8f8409f3421284ddf0f7cb09fd2c8484da047a.exe
-
Size
491KB
-
Sample
240423-bs75psah25
-
MD5
7b7b5d55a8337975ed0ab4f9f426d525
-
SHA1
d89bfa223df289305074dcf9b9a7d15b65e0634c
-
SHA256
70832e266e86d980fbe532bc2a8f8409f3421284ddf0f7cb09fd2c8484da047a
-
SHA512
b46b2758f5bb8028e9d53dfeb16b2522a06d65e98602508d4447ac23c42876558c33127092f11b98f8a18b0d306a733e4e4d992dc3e51946cb34549956383faa
-
SSDEEP
12288:+0fa1MTNVDDGVtfVmzwLXHPze4AYP2htt3YGePOAoCe:ba1mNoVrUwLLe4FazoGePOBR
Static task
static1
Behavioral task
behavioral1
Sample
70832e266e86d980fbe532bc2a8f8409f3421284ddf0f7cb09fd2c8484da047a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
70832e266e86d980fbe532bc2a8f8409f3421284ddf0f7cb09fd2c8484da047a.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
redline
LogsDiller Cloud (Telegram: @logsdillabot)
5.42.65.50:33080
Targets
-
-
Target
70832e266e86d980fbe532bc2a8f8409f3421284ddf0f7cb09fd2c8484da047a.exe
-
Size
491KB
-
MD5
7b7b5d55a8337975ed0ab4f9f426d525
-
SHA1
d89bfa223df289305074dcf9b9a7d15b65e0634c
-
SHA256
70832e266e86d980fbe532bc2a8f8409f3421284ddf0f7cb09fd2c8484da047a
-
SHA512
b46b2758f5bb8028e9d53dfeb16b2522a06d65e98602508d4447ac23c42876558c33127092f11b98f8a18b0d306a733e4e4d992dc3e51946cb34549956383faa
-
SSDEEP
12288:+0fa1MTNVDDGVtfVmzwLXHPze4AYP2htt3YGePOAoCe:ba1mNoVrUwLLe4FazoGePOBR
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Suspicious use of SetThreadContext
-