General
-
Target
330b91473f27721d99e11cde67a05631aefcac78b6b69fc7b6bb61bd053ddbe6.exe
-
Size
314KB
-
Sample
240927-bjvg9axdrq
-
MD5
2cfc1aa34c34f4968b099aa7646097a5
-
SHA1
8f0474e95ebd679be59eb2c002056bef9361305c
-
SHA256
330b91473f27721d99e11cde67a05631aefcac78b6b69fc7b6bb61bd053ddbe6
-
SHA512
81a4b338cf5a931e7a24c5de37069aec288cfbdd5f94895c470bef2f3407eea3e1046d5072e690430288719560baa4d63f21b89876c07d63811b5da3a9611e81
-
SSDEEP
6144:89ecSWylbPXlZctxOTyORbnRRX8LC3V7/9rQxf08+LFYM:89eDNvcqT9Z7WC5/9ES8y
Static task
static1
Behavioral task
behavioral1
Sample
330b91473f27721d99e11cde67a05631aefcac78b6b69fc7b6bb61bd053ddbe6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
330b91473f27721d99e11cde67a05631aefcac78b6b69fc7b6bb61bd053ddbe6.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
91.211.248.215:24327
Targets
-
-
Target
330b91473f27721d99e11cde67a05631aefcac78b6b69fc7b6bb61bd053ddbe6.exe
-
Size
314KB
-
MD5
2cfc1aa34c34f4968b099aa7646097a5
-
SHA1
8f0474e95ebd679be59eb2c002056bef9361305c
-
SHA256
330b91473f27721d99e11cde67a05631aefcac78b6b69fc7b6bb61bd053ddbe6
-
SHA512
81a4b338cf5a931e7a24c5de37069aec288cfbdd5f94895c470bef2f3407eea3e1046d5072e690430288719560baa4d63f21b89876c07d63811b5da3a9611e81
-
SSDEEP
6144:89ecSWylbPXlZctxOTyORbnRRX8LC3V7/9rQxf08+LFYM:89eDNvcqT9Z7WC5/9ES8y
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2