General
-
Target
50c33eaa07d5b99a35a9860123e2fd84551a0907170a199ead8f5e1e2b0097c6
-
Size
314KB
-
Sample
240919-2henhsvapg
-
MD5
8240da70945e9b8a7844f1f4e2f1c770
-
SHA1
37c0f67a71107a5821e1e3f98563e8c331f3618d
-
SHA256
50c33eaa07d5b99a35a9860123e2fd84551a0907170a199ead8f5e1e2b0097c6
-
SHA512
e8b6f7baa8ce2d0d2cd18ab59f15be033d8785a5b9c89e9b2cbd6abdfd169856ca11860e2f9cdf8c910f332aa26f39c8b093a0c67671fc05016ae3eb56f5c039
-
SSDEEP
6144:JHAACjT1WsFpbp55axXma+dYLBbHjQYe7Ub7q+ODITYf2zi7moWRuRce:in1rSXOYLl8Ye7Q7nOsTY/5WAc
Static task
static1
Behavioral task
behavioral1
Sample
50c33eaa07d5b99a35a9860123e2fd84551a0907170a199ead8f5e1e2b0097c6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
50c33eaa07d5b99a35a9860123e2fd84551a0907170a199ead8f5e1e2b0097c6.exe
Resource
win10-20240404-en
Malware Config
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
193.233.255.84:4284
Targets
-
-
Target
50c33eaa07d5b99a35a9860123e2fd84551a0907170a199ead8f5e1e2b0097c6
-
Size
314KB
-
MD5
8240da70945e9b8a7844f1f4e2f1c770
-
SHA1
37c0f67a71107a5821e1e3f98563e8c331f3618d
-
SHA256
50c33eaa07d5b99a35a9860123e2fd84551a0907170a199ead8f5e1e2b0097c6
-
SHA512
e8b6f7baa8ce2d0d2cd18ab59f15be033d8785a5b9c89e9b2cbd6abdfd169856ca11860e2f9cdf8c910f332aa26f39c8b093a0c67671fc05016ae3eb56f5c039
-
SSDEEP
6144:JHAACjT1WsFpbp55axXma+dYLBbHjQYe7Ub7q+ODITYf2zi7moWRuRce:in1rSXOYLl8Ye7Q7nOsTY/5WAc
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2