General
-
Target
107714b94dac0431b5f012d957466dbd7033fa18
-
Size
140KB
-
Sample
241110-c7cg1sxfrj
-
MD5
3ffffeba2599dcb1ae97990e4bdee322
-
SHA1
107714b94dac0431b5f012d957466dbd7033fa18
-
SHA256
a33f2c76749b47b74f586f4a3c182b2c060f0f2a26ff27b29ffbaf5fb36dee80
-
SHA512
6deca438f89d7f118f83fdb2662b1e5db7af52d773708534e1a78ac2fa765a8d69868817f475289622014ceab3987ce45849cfec796bc119390d8af7c831b23d
-
SSDEEP
3072:cya4ZFAWC5cVv2tRxljEW3D+PPUUOokOaI9pMyWjQ6TVvVBYRlv:cv4qc03QPUXI9pMvjBpE
Static task
static1
Behavioral task
behavioral1
Sample
013a487ee136477c46706f149fccc14409f7bc0a53060bbfec4fca1ea2b8133b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
013a487ee136477c46706f149fccc14409f7bc0a53060bbfec4fca1ea2b8133b.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
213.32.44.120:6254
-
auth_value
3a050df92d0cf082b2cdaf87863616be
Targets
-
-
Target
013a487ee136477c46706f149fccc14409f7bc0a53060bbfec4fca1ea2b8133b.exe
-
Size
252KB
-
MD5
eecea8a0d8cf4bb72e7fe29909f78189
-
SHA1
e34ce307cb0d9d4bb0e20109fad273efb3b75a21
-
SHA256
013a487ee136477c46706f149fccc14409f7bc0a53060bbfec4fca1ea2b8133b
-
SHA512
d458108a23f9ba8fef392fd7dfe3473c331df9066f7cc9fe383b06f27e84ec8cb0b5a2e8f1aeeaf2bfa17ccb8fdfeb5cee13c1c5a1e70519713c92c363967cc6
-
SSDEEP
6144:jUmnhkRWlYBmweduFyFdG1B8fIu3P3HegxA4c:HnhkRWASZ3vHzxAv
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-