General
-
Target
1023fd71dd03144d53a2f27ed8042a11e846a6cfeded2cd418290b91631ed7f2
-
Size
221KB
-
Sample
241109-s6fq2swnas
-
MD5
20c9dd06975042983be9eefa9bcb0e9f
-
SHA1
415e4240596d0093bdc9cdfcdefaf2ab3afa494d
-
SHA256
1023fd71dd03144d53a2f27ed8042a11e846a6cfeded2cd418290b91631ed7f2
-
SHA512
7d16b759fb203ea29a02f82f8016925cdc08c9888a5ab54cec648a5dff3fa8f82e9cbf0b3f61c29592353ca738b27657166a317abfbd32d35323d20d6866fabd
-
SSDEEP
3072:5FsvbkUZrLnLT1jLf6XbevvUNtZXRPqUIHr2IVddboOnEu89Tu+hG:SnrTLTJGrOvUNnl3IHr2I7Jqu895E
Static task
static1
Behavioral task
behavioral1
Sample
42f569feb9d6fc7561953999288ab6241dd8825c1a9ba2e7f268d5f47c612da8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
42f569feb9d6fc7561953999288ab6241dd8825c1a9ba2e7f268d5f47c612da8.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
149.202.8.114:26642
-
auth_value
3a050df92d0cf082b2cdaf87863616be
Targets
-
-
Target
42f569feb9d6fc7561953999288ab6241dd8825c1a9ba2e7f268d5f47c612da8.exe
-
Size
348KB
-
MD5
e4f8f0a91c597b50889f5cc55394efd0
-
SHA1
aee0095eda93e3f1ecaf816e77e9031b8a20fd4d
-
SHA256
42f569feb9d6fc7561953999288ab6241dd8825c1a9ba2e7f268d5f47c612da8
-
SHA512
6fd704ef7d903b72546e195572876f4122b4953b7088cb1136b565b509c4e22675b48147f9567c36117f097b44ef80d7b5378dc4acc5f7ee3ddfbb79cd8f197a
-
SSDEEP
6144:R20gvpJjSqh3wn5PCLFGJ5MiFPLCcMRyOB6Bwnvh:U08PjS2Ep3lFlMRPQBcvh
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-