General
-
Target
62475a883074268f197b2f2c5bfe8f581ce947ce837ac20bb6d6e8ecdcf60dd0
-
Size
166KB
-
Sample
241105-ah6y8azgme
-
MD5
2436a621554f77bec49465623597b32a
-
SHA1
8aa454e61b18e088fb28dba6827609336d2cd5dd
-
SHA256
62475a883074268f197b2f2c5bfe8f581ce947ce837ac20bb6d6e8ecdcf60dd0
-
SHA512
60ccbfa6802914bbbf52f190a56395626c170e6fb7fbba08863cba0cc1457fbffb1c87ae8e31131612141cb88d8028d35c8df9f25c86aed28ac21fcaddde81af
-
SSDEEP
3072:rsMxvmONsYw2pk+Rxk5Fqb1s063fxOYggdVaVRf++6OSOqBmRDxJU2j3tzO+Lkj:rDxvmn2i+RmubS06kYTVOh+e3xJhO+gj
Static task
static1
Behavioral task
behavioral1
Sample
5bade268b67fbd24241fbc7759697cf2515dc54f4812ffc753e12a3db23945ae.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5bade268b67fbd24241fbc7759697cf2515dc54f4812ffc753e12a3db23945ae.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
51.89.204.181:22299
-
auth_value
3a050df92d0cf082b2cdaf87863616be
Targets
-
-
Target
5bade268b67fbd24241fbc7759697cf2515dc54f4812ffc753e12a3db23945ae.exe
-
Size
1.5MB
-
MD5
da4360b12f0f88c9b17d67c96505e4c5
-
SHA1
1cd70d78a30236f05e0cef16da51df1ad7f77d1a
-
SHA256
5bade268b67fbd24241fbc7759697cf2515dc54f4812ffc753e12a3db23945ae
-
SHA512
3ad660ac538fb67ef32b8e4bcda5c1983aca9fada3b12357afdd53a0daba38d8def7677f65a91f057834997526ce05295c514e2ae160c5a5895fb3b82ff13e48
-
SSDEEP
6144:dsGMTIQl2t9xKQzAAOf6yqTmwMCWE3rlPl:dfMTIg2xANYTmJC/Pl
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Suspicious use of SetThreadContext
-