General
-
Target
file.exe
-
Size
323KB
-
Sample
240917-rnzwjaxdjb
-
MD5
a0c6989730b44ee30722feccd86d946b
-
SHA1
4ef62e701352c7dfdf0807460dc4bb3c22be67f0
-
SHA256
5669998000fdc457a919dea600b100809d0bb5681cbca6a67b544307233b5915
-
SHA512
e5c622f22ad40cddae798853d40af4695a37bd75624193c0181504a3ac2a28c146339bf06ae0110a995c90bdfcaab9a3072e18a7f610cbed24d5b1d028fc5eba
-
SSDEEP
6144:KF0iDT0uzcvXjGQfp1Shf0J4eKC+2Lojfckt6QLniqtBZ2AWwZB24kAscHjs34ha:KF0iPDcffXLqdtpLiqtBZ2AdLdkAssjA
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
193.233.255.84:4284
Targets
-
-
Target
file.exe
-
Size
323KB
-
MD5
a0c6989730b44ee30722feccd86d946b
-
SHA1
4ef62e701352c7dfdf0807460dc4bb3c22be67f0
-
SHA256
5669998000fdc457a919dea600b100809d0bb5681cbca6a67b544307233b5915
-
SHA512
e5c622f22ad40cddae798853d40af4695a37bd75624193c0181504a3ac2a28c146339bf06ae0110a995c90bdfcaab9a3072e18a7f610cbed24d5b1d028fc5eba
-
SSDEEP
6144:KF0iDT0uzcvXjGQfp1Shf0J4eKC+2Lojfckt6QLniqtBZ2AWwZB24kAscHjs34ha:KF0iPDcffXLqdtpLiqtBZ2AdLdkAssjA
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2