General
-
Target
fe8b79e2efd9685857c859a5449501fdac4cb227b478beaa6c6f765d12589f0b
-
Size
497KB
-
Sample
240704-2rw9xstflk
-
MD5
7a7a09f3db15ab0f19a9a6f359fef8d7
-
SHA1
1096c1a07df97a68760fb1b4d2a932aed7e37aba
-
SHA256
fe8b79e2efd9685857c859a5449501fdac4cb227b478beaa6c6f765d12589f0b
-
SHA512
8f48e95c8e500f278198b5182b811247ed84401785b3718090930e7a99101d1380979a55c3784f60711baa7a3b1fb9829504df6c290627d0e7596e67d7d2e3fe
-
SSDEEP
12288:7COROIn2UaYK91zzI4G2YKudQjDV8bFr7GPPH6xKleovRAxO1A6:7COIA2MII4G2gQ29ePaxxca
Static task
static1
Behavioral task
behavioral1
Sample
fe8b79e2efd9685857c859a5449501fdac4cb227b478beaa6c6f765d12589f0b.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fe8b79e2efd9685857c859a5449501fdac4cb227b478beaa6c6f765d12589f0b.exe
Resource
win10-20240404-en
Malware Config
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
77.105.135.107:3445
Targets
-
-
Target
fe8b79e2efd9685857c859a5449501fdac4cb227b478beaa6c6f765d12589f0b
-
Size
497KB
-
MD5
7a7a09f3db15ab0f19a9a6f359fef8d7
-
SHA1
1096c1a07df97a68760fb1b4d2a932aed7e37aba
-
SHA256
fe8b79e2efd9685857c859a5449501fdac4cb227b478beaa6c6f765d12589f0b
-
SHA512
8f48e95c8e500f278198b5182b811247ed84401785b3718090930e7a99101d1380979a55c3784f60711baa7a3b1fb9829504df6c290627d0e7596e67d7d2e3fe
-
SSDEEP
12288:7COROIn2UaYK91zzI4G2YKudQjDV8bFr7GPPH6xKleovRAxO1A6:7COIA2MII4G2gQ29ePaxxca
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-