General
-
Target
c15c91c578b84e19b66599a4eaa29636.bin
-
Size
414KB
-
Sample
240429-b7gw3afb5s
-
MD5
6496546be1bcc2f49e99771744f45eb5
-
SHA1
cef48f443cb53674d793a9237d90240f6f9046c6
-
SHA256
e7468d45f817c28a5601bbc2b0f9912188a036d90b9ccc64c77868467e2862b9
-
SHA512
1031c427a0f01b1f33ab75011344c2bb2db0f23aa05ed9596ddf1b9e40643fe649da77e7ef1e83c19d87d2ebf7d993a6408f2ce94ef465767d343f2f4668c6f5
-
SSDEEP
12288:f21SGsP911TAjsOCw+GbJyb0voj6Emai9U8M1pQND:+u9LOPb0iTai9Uqd
Static task
static1
Behavioral task
behavioral1
Sample
dee9ad32eab4891fb956f119086543a5220518547f24794812f42e012b0cc1d4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dee9ad32eab4891fb956f119086543a5220518547f24794812f42e012b0cc1d4.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
5.42.65.96:28380
Targets
-
-
Target
dee9ad32eab4891fb956f119086543a5220518547f24794812f42e012b0cc1d4.exe
-
Size
518KB
-
MD5
c15c91c578b84e19b66599a4eaa29636
-
SHA1
2baf692d598ade6f2348fa5a875857abb70e4ca9
-
SHA256
dee9ad32eab4891fb956f119086543a5220518547f24794812f42e012b0cc1d4
-
SHA512
2268017aa29e327707f3471957296056c496c7ba835c6ddca7f4bed59b1882d93bbaab46c9f4ae1c5ab120f9ceda8a4a096566ad37b23103829676c8cf3b7d77
-
SSDEEP
12288:pbA9s8w7P9Ca47E6uUlVGd7KaL7mTIFc/K9lTdovsC:KsDb4nKwaXmMy/K/Th
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-