General
-
Target
d0ae77f27fe071e72ea2653c350e5c01e5aaf04450817cd106c4e6fd5d1c6416
-
Size
2.0MB
-
Sample
241108-b9kqqs1qht
-
MD5
f02af2977f11ac34ab91c03193f4b777
-
SHA1
cfa8dca501eac7d264e745205f779fc26a752f79
-
SHA256
d0ae77f27fe071e72ea2653c350e5c01e5aaf04450817cd106c4e6fd5d1c6416
-
SHA512
3bfd3e6560704f5827c5f90dede6716a9472ec2e8bfb7e278715dfa0b2b483ce2790a6ab587bdc4fdac0b8af11564b047c0e7231027452efdd35e2edc9a08094
-
SSDEEP
49152:/nLvY2rpJbcTP6wyGxXdjmMl2CH+UVFhaY2j7T3lbN+x7oue+qN:/LQ2VJbcTCZGxXdTECgj7T3GdbqN
Static task
static1
Behavioral task
behavioral1
Sample
f7a1329e5d2d787c17e5357dfe8242f14dc9e1faf5981a1a4d9d8d1d6511f9ff.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f7a1329e5d2d787c17e5357dfe8242f14dc9e1faf5981a1a4d9d8d1d6511f9ff.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
51.210.137.6:47909
-
auth_value
3a050df92d0cf082b2cdaf87863616be
Targets
-
-
Target
f7a1329e5d2d787c17e5357dfe8242f14dc9e1faf5981a1a4d9d8d1d6511f9ff.exe
-
Size
2.2MB
-
MD5
a7fadc5ffccd272e1f3e5dc1717926de
-
SHA1
d7ec968dbd537158f91b3493fd5f6657e7572836
-
SHA256
f7a1329e5d2d787c17e5357dfe8242f14dc9e1faf5981a1a4d9d8d1d6511f9ff
-
SHA512
a297600ba51c2ffa19ddcf0183a949393ea138240cb404ad38b4f90aaaf2dbec2cc8e4cc3f32678ae01e65653f18d91782fde4e3f54789c161986f2561d981d7
-
SSDEEP
49152:V5OXoeI6Fye8Aivbktejn/dGiGf/vkADafh2KdOTD5Q1f:V5Youevbk2ngiwFafhLOT9Q1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-