General
-
Target
1692db4e522605d93551ddcabeffa92a2cd43e764a134833644808319784b955_dump.exe
-
Size
304KB
-
Sample
240522-3e1x1sda9t
-
MD5
1fb1c8da0fabb641a76ac6759dd557dd
-
SHA1
eac9ef0a2bb9058efcc01242184f7a10136a5036
-
SHA256
2f05df98b8de8af85942d15c1c7d434ee62be3e3662c551a0e14d29c9531c1cc
-
SHA512
44623c837f1537783e44703637407b3330db2201800f0ab5d2552f3b67368b320734e1fa12143c1ed9df75518c641817039bec7ec74c2c18d4efe22dd83739cd
-
SSDEEP
3072:1q6EgY6iHrUj1DeewPMAVTmz+qGwRTAAtpSKGscZqf7D341eqiOLibBOp:8qY6iwwPv9priTA8pIscZqf7DIfL
Behavioral task
behavioral1
Sample
1692db4e522605d93551ddcabeffa92a2cd43e764a134833644808319784b955_dump.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1692db4e522605d93551ddcabeffa92a2cd43e764a134833644808319784b955_dump.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
5.42.65.115:40551
Targets
-
-
Target
1692db4e522605d93551ddcabeffa92a2cd43e764a134833644808319784b955_dump.exe
-
Size
304KB
-
MD5
1fb1c8da0fabb641a76ac6759dd557dd
-
SHA1
eac9ef0a2bb9058efcc01242184f7a10136a5036
-
SHA256
2f05df98b8de8af85942d15c1c7d434ee62be3e3662c551a0e14d29c9531c1cc
-
SHA512
44623c837f1537783e44703637407b3330db2201800f0ab5d2552f3b67368b320734e1fa12143c1ed9df75518c641817039bec7ec74c2c18d4efe22dd83739cd
-
SSDEEP
3072:1q6EgY6iHrUj1DeewPMAVTmz+qGwRTAAtpSKGscZqf7D341eqiOLibBOp:8qY6iwwPv9priTA8pIscZqf7DIfL
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-