General
-
Target
cc9061f5aa0a3be490e90be334be74e025bc7fd28a55ac3e68aeded57f482e72
-
Size
1.6MB
-
Sample
241108-2js8astpfl
-
MD5
fd60a6d7a8ccbc8bd018def9ead90417
-
SHA1
679836046c024e1d06d8652f3efd80d00fce4a34
-
SHA256
cc9061f5aa0a3be490e90be334be74e025bc7fd28a55ac3e68aeded57f482e72
-
SHA512
6324e63ccc1196a3f38db6a53ebff493fde2e7232d1241903aedda5d8493d613424814384a869c9099c389ecf6255434cb73311bb6ef8241be1ca9327561e21e
-
SSDEEP
49152:srBq9BM2ObpzQ1tdjkQjR1V0FTF98O7znJTH:yBoepCRjjOFf8O/JTH
Static task
static1
Behavioral task
behavioral1
Sample
5aa72ffbc299f8ebe8ead4e520cd19faa66ab9ef872a0fc38dda11fd76a23373.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5aa72ffbc299f8ebe8ead4e520cd19faa66ab9ef872a0fc38dda11fd76a23373.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
51.210.137.6:47909
-
auth_value
3a050df92d0cf082b2cdaf87863616be
Targets
-
-
Target
5aa72ffbc299f8ebe8ead4e520cd19faa66ab9ef872a0fc38dda11fd76a23373.exe
-
Size
1.8MB
-
MD5
d59be142eb273dd2c2475932ea507be9
-
SHA1
778922a0c3449b856f1b655866fb80542277e4fa
-
SHA256
5aa72ffbc299f8ebe8ead4e520cd19faa66ab9ef872a0fc38dda11fd76a23373
-
SHA512
a65cd3061b2533d1cab10df6e7157cce8983fb1b94e30137e9ccb4cb6bad08fab4b587030e5225e17914ae8bab02add30629fd9c872274d34ed69cbdc4c92fce
-
SSDEEP
49152:V5OSyRh7E/kByJ4g3AVm5c3+12bk7vRDB3VwMylYZRD:V5yRh75W4wAycuQbk1FFwvYv
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-