General
-
Target
220a2362c7fcf1c46034d8c914a18056fb0f29baa38b714682cb1a5127c04bc9.exe
-
Size
339KB
-
Sample
240527-gxvcasaf31
-
MD5
e4003c660e8a81a496d3429dcb01e44a
-
SHA1
dfcc4bd954e39a92230f46170b17f918e1df7402
-
SHA256
220a2362c7fcf1c46034d8c914a18056fb0f29baa38b714682cb1a5127c04bc9
-
SHA512
750bd6a73582aa21bb07e5f6675748524c112d441f8e8808f55b8383d860ea97c856f7ba5f0f8f5dccd30696e6c4fd85b34aeaca33f3f798d89b3f7d375836e4
-
SSDEEP
6144:g101L8oL4DDlqXesFgXwxMUdBnqvKDvWRryoGPiRWL2yUz6gZi:98c4FqX3xMU0KDvWRryoGPiRWL2yUz6b
Static task
static1
Behavioral task
behavioral1
Sample
220a2362c7fcf1c46034d8c914a18056fb0f29baa38b714682cb1a5127c04bc9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
220a2362c7fcf1c46034d8c914a18056fb0f29baa38b714682cb1a5127c04bc9.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
redline
LogsDiller Cloud (Telegram: @logsdillabot)
5.42.65.115:40551
Targets
-
-
Target
220a2362c7fcf1c46034d8c914a18056fb0f29baa38b714682cb1a5127c04bc9.exe
-
Size
339KB
-
MD5
e4003c660e8a81a496d3429dcb01e44a
-
SHA1
dfcc4bd954e39a92230f46170b17f918e1df7402
-
SHA256
220a2362c7fcf1c46034d8c914a18056fb0f29baa38b714682cb1a5127c04bc9
-
SHA512
750bd6a73582aa21bb07e5f6675748524c112d441f8e8808f55b8383d860ea97c856f7ba5f0f8f5dccd30696e6c4fd85b34aeaca33f3f798d89b3f7d375836e4
-
SSDEEP
6144:g101L8oL4DDlqXesFgXwxMUdBnqvKDvWRryoGPiRWL2yUz6gZi:98c4FqX3xMU0KDvWRryoGPiRWL2yUz6b
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-