General
-
Target
9545cb95accf9eb43999ff192849f2c8c2ef8286c3fc1232d3750cbcd9c8dc4e
-
Size
313KB
-
Sample
240926-2p3nxsvdkc
-
MD5
4e97e36dd5e4fae769cb1ade01d9be99
-
SHA1
b1220d2748e84cca637192291c49a9641ebb348e
-
SHA256
9545cb95accf9eb43999ff192849f2c8c2ef8286c3fc1232d3750cbcd9c8dc4e
-
SHA512
7137ff8dc9807fbe046a5daf432871b96cfb2286e76d0e765f5966ed9a1734f44ef9386d22cc98aadece40998bc8e86632b55506c7a9b45af515db1eb25eaf3d
-
SSDEEP
6144:49SiPY2r9uh6YdytMe6J5jiqsGN9r0u2iIRBd0VlzC7El8GzgsJFkci:wZPYg9uhbc6JRLN9IiKaVltl8g1kc
Static task
static1
Behavioral task
behavioral1
Sample
9545cb95accf9eb43999ff192849f2c8c2ef8286c3fc1232d3750cbcd9c8dc4e.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
9545cb95accf9eb43999ff192849f2c8c2ef8286c3fc1232d3750cbcd9c8dc4e.exe
Resource
win10-20240404-en
Malware Config
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
193.233.255.77:1891
Targets
-
-
Target
9545cb95accf9eb43999ff192849f2c8c2ef8286c3fc1232d3750cbcd9c8dc4e
-
Size
313KB
-
MD5
4e97e36dd5e4fae769cb1ade01d9be99
-
SHA1
b1220d2748e84cca637192291c49a9641ebb348e
-
SHA256
9545cb95accf9eb43999ff192849f2c8c2ef8286c3fc1232d3750cbcd9c8dc4e
-
SHA512
7137ff8dc9807fbe046a5daf432871b96cfb2286e76d0e765f5966ed9a1734f44ef9386d22cc98aadece40998bc8e86632b55506c7a9b45af515db1eb25eaf3d
-
SSDEEP
6144:49SiPY2r9uh6YdytMe6J5jiqsGN9r0u2iIRBd0VlzC7El8GzgsJFkci:wZPYg9uhbc6JRLN9IiKaVltl8g1kc
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Suspicious use of SetThreadContext
-