General
-
Target
04f2eff1dd77312eb9e4dfbebb49e672606cab01
-
Size
140KB
-
Sample
241107-qpyt7ashpg
-
MD5
e2083c9d594cd62c2e8e940f7a65341f
-
SHA1
04f2eff1dd77312eb9e4dfbebb49e672606cab01
-
SHA256
3226835cbe186ba029013302f79ac29e14f3f4e35b9cd1eec67c0ca86d5e8adf
-
SHA512
c316078c14957938a1682d10bbd94d4f4af1c4e8272466c54e11e909210785c80affb65472f2e57d56fc7d07fc8e9e4f0a213e9a220517b0b721c0c857ed2e0e
-
SSDEEP
3072:SAf5ICDXKiSqZUjb85lqGoxx1OuL1TLRT3kJgfC:Xu9Zvg5UGoMuBv53kJB
Static task
static1
Behavioral task
behavioral1
Sample
013a487ee136477c46706f149fccc14409f7bc0a53060bbfec4fca1ea2b8133b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
013a487ee136477c46706f149fccc14409f7bc0a53060bbfec4fca1ea2b8133b.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
213.32.44.120:6254
-
auth_value
3a050df92d0cf082b2cdaf87863616be
Targets
-
-
Target
013a487ee136477c46706f149fccc14409f7bc0a53060bbfec4fca1ea2b8133b.exe
-
Size
252KB
-
MD5
eecea8a0d8cf4bb72e7fe29909f78189
-
SHA1
e34ce307cb0d9d4bb0e20109fad273efb3b75a21
-
SHA256
013a487ee136477c46706f149fccc14409f7bc0a53060bbfec4fca1ea2b8133b
-
SHA512
d458108a23f9ba8fef392fd7dfe3473c331df9066f7cc9fe383b06f27e84ec8cb0b5a2e8f1aeeaf2bfa17ccb8fdfeb5cee13c1c5a1e70519713c92c363967cc6
-
SSDEEP
6144:jUmnhkRWlYBmweduFyFdG1B8fIu3P3HegxA4c:HnhkRWASZ3vHzxAv
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-