General
-
Target
004baadff1a627a2f86e6a8345233037.bin
-
Size
2.7MB
-
Sample
240531-bcpy7ahh99
-
MD5
155dcf59e9e5757179ce7c3ef46a8afc
-
SHA1
824155200409fe153f2c65d18c785a3b70783b88
-
SHA256
916e4e621e29194977ebba97aa8477b761aab0a15981dab967b20d4f6475bf6f
-
SHA512
3ab9a6cb87e0aeff3041d1dc795f31f932f9ff104ab224f4af881034a5dfefa950a18f6c5509367c4d1f8e3301689640fddf853430cd4579a020f647fc4e4b48
-
SSDEEP
49152:n4pWR6oIiFF0HqQwVBynYjapcgIMy2qUAw2mHED2IV3oy9QV+HaZ3X9JF5J5aZrR:4p6/QmapcgjNl/+RZz4j5GN
Static task
static1
Behavioral task
behavioral1
Sample
7090723b5821d015e801d537ad745b7de3046ade870b4fd7a3ee8a5ad7d16a46.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7090723b5821d015e801d537ad745b7de3046ade870b4fd7a3ee8a5ad7d16a46.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
5.42.65.129:2353
Targets
-
-
Target
7090723b5821d015e801d537ad745b7de3046ade870b4fd7a3ee8a5ad7d16a46.exe
-
Size
5.0MB
-
MD5
004baadff1a627a2f86e6a8345233037
-
SHA1
9447e67628b6e61adf1f21ad4169481b822d54fe
-
SHA256
7090723b5821d015e801d537ad745b7de3046ade870b4fd7a3ee8a5ad7d16a46
-
SHA512
20b437eab89aaccba30c687b254a2ab3834cd78f774b794cf54ac6cae33f3c95a7a793a3f87beb20968e31b23cff711ceab5a6cd1923875380e53512fb9c581e
-
SSDEEP
98304:a3Txn5/Y05WHbdPn+eT4Om2pZ90XYis5VfIcm:azg05WHbdmPeZ90XYis5V0
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-