General
-
Target
b3c9222a8665281e005cddc587c0ca7d2eb5df4cb876b2251addc2dc3275a604
-
Size
2.0MB
-
Sample
241109-cq3b4sxpcp
-
MD5
afbdbad8a28af7eaac913c46e2cd0321
-
SHA1
91840f8f2f568363bc8f9224ea614d60053320e3
-
SHA256
b3c9222a8665281e005cddc587c0ca7d2eb5df4cb876b2251addc2dc3275a604
-
SHA512
a15baa9bf7eb6ee59cce70f6bda8deadb44186fbd70a975dd6e4700b235e16478f827584a8a4ad9197c693ee687758baa6339f12b95bf11143ae467f5c8a8371
-
SSDEEP
49152:+lBA2fIBVAO4V2Mof/01VrV9zeFTs2/7m5x2LVAKMXe2OIfl2:+M2K4Zo301hV9zee20QJMqS0
Static task
static1
Behavioral task
behavioral1
Sample
fa17fb4d70e3c39e5548ea0f6980ae951c1f009890d79471b4792360002e34a7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa17fb4d70e3c39e5548ea0f6980ae951c1f009890d79471b4792360002e34a7.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
51.89.207.166:47909
-
auth_value
3a050df92d0cf082b2cdaf87863616be
Targets
-
-
Target
fa17fb4d70e3c39e5548ea0f6980ae951c1f009890d79471b4792360002e34a7.exe
-
Size
2.1MB
-
MD5
9cc134659561ee2afd14fd6433e9661d
-
SHA1
9c358826da568be19f1c244f810d3ff59087c295
-
SHA256
fa17fb4d70e3c39e5548ea0f6980ae951c1f009890d79471b4792360002e34a7
-
SHA512
34fa7b49d7cdbae6bcd9d57af67c36258fd7c3721abda9e576a523630c0f072d1a67ed43ecd7304256907d1625f4dbb8e68ed98c0934e734ba338cb1fafdd125
-
SSDEEP
49152:V5O7fPYebhETwwFP+/CHapiBiSyKHKmagg5vtpNuT4D3S:V5EfP1bhmFPaCuiRsmJgnpNuT4DC
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-