General
-
Target
e600b6015b0312b52214f459fcc6f3c2.bin
-
Size
314KB
-
Sample
240907-cbp38syhqk
-
MD5
06ee8cf1f9b3238ccb09f4da75b9349f
-
SHA1
87d070bde659b5dad58c004f208472d38662e17f
-
SHA256
78393264f1c4e8976afccf462ee02298b293f0dde66d72d36327f7d1000552e6
-
SHA512
728f9d6c274d9bd42bf8b9a2100d834bb33026ce9433f22a66e7f8f0617b913de764d5aaf08519c255e7d233a6d93fa5ebf09db860e4dbc8d9a6657cb0766706
-
SSDEEP
6144:QkR7zlM0kfY9gzeO0X4PmmbQDR/bBxpRzMYviJYDdbgv815PLO:QAqA9gzIkFbQDR/bBvRAYqJf015PLO
Static task
static1
Behavioral task
behavioral1
Sample
65bb6281d63ad091f8b6b4d0c460d9d6c1631fe141fe15b23dc6d23a41e094ad.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
65bb6281d63ad091f8b6b4d0c460d9d6c1631fe141fe15b23dc6d23a41e094ad.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
147.45.47.36:30035
Targets
-
-
Target
65bb6281d63ad091f8b6b4d0c460d9d6c1631fe141fe15b23dc6d23a41e094ad.exe
-
Size
324KB
-
MD5
e600b6015b0312b52214f459fcc6f3c2
-
SHA1
0e763e33524e467b46d27e5f0603cd2165c47fed
-
SHA256
65bb6281d63ad091f8b6b4d0c460d9d6c1631fe141fe15b23dc6d23a41e094ad
-
SHA512
b1c1a68128c2cd75df9cb1d890358fd6bb85d9a62288468a19db3295cc25e6cb97c05fa0b5bc3b1dd2b88bd39b343ce5cd1494ca8ab56352c1e375e88fe7e464
-
SSDEEP
6144:sPP5QJyXEJZq77hQ8ed1oBj32nQumiUdfg+CYnDNMhXYGenCnaW1qMJyky:cGJyX2EdQ8ed1K+Yfg+DDGYn4aW1TJyD
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Suspicious use of SetThreadContext
-