General
-
Target
f3dfc24f465166d35c26f23c30d4d9da5ecf5fdab39dbb01058470e22ab17886
-
Size
2.0MB
-
Sample
241108-1tgftatkaj
-
MD5
0172f0c47b1b4aa37dcd142d03b1d790
-
SHA1
a817fae7d09c74e3a2360a1af912541e492b41b5
-
SHA256
f3dfc24f465166d35c26f23c30d4d9da5ecf5fdab39dbb01058470e22ab17886
-
SHA512
ca4e12cf117485c634f73a62433a05c05313cac6d8dc472cabf9edbce01d79d8f0c980af0edd34d3ff408ac9f1c0308550fa9c1b9b4fac4fc3373264149f8d94
-
SSDEEP
49152:wseacOlfRgp0tCGk1zJ09b3Us7fb0gNZ0btYoRY1DWjJb:xVflfB0GQk3HjHNMY3il
Static task
static1
Behavioral task
behavioral1
Sample
83c239daead7fd351924f1580a026cc9c93115adbd9e992a1c65deabbe2701b4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
83c239daead7fd351924f1580a026cc9c93115adbd9e992a1c65deabbe2701b4.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
51.210.137.6:47909
-
auth_value
3a050df92d0cf082b2cdaf87863616be
Targets
-
-
Target
83c239daead7fd351924f1580a026cc9c93115adbd9e992a1c65deabbe2701b4.exe
-
Size
2.2MB
-
MD5
bda80c569715cb4e427f9408b389238a
-
SHA1
c1982d58ce154872aced5460cd88b106dfeaa6f7
-
SHA256
83c239daead7fd351924f1580a026cc9c93115adbd9e992a1c65deabbe2701b4
-
SHA512
ee31887687504525cfe9b0ac9e079a396ba92819bdfca2eb5259bea8b900a762cf58630cd19dc2fefbffa5253a30344691438cd3d344086ef337247f2247411d
-
SSDEEP
49152:V5Oxg/TFlCpM/CWKNdDgQbHbJwzF00nVLqk6FzreoZo:V5FFlCi/n4mc7M00nVGkgzrnZo
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-