General
-
Target
7331508715d63967791fc154b004bd5e5839560c13a9a245d4764ea2d256b311
-
Size
2.0MB
-
Sample
241110-l5hqpaxqaj
-
MD5
eef2f1ef85a876a62e84e42f0838a0ec
-
SHA1
23034ddf0a664520c20a62d01ceeeea239a82a60
-
SHA256
7331508715d63967791fc154b004bd5e5839560c13a9a245d4764ea2d256b311
-
SHA512
62a510a8f4db6c14dd942a2dee5e0374431e8ee2328a9a2b3f03e8cdf5d46bb840dd862c1a7ff26c07993a0584811e2611a1f06242df5fb88a08fc261993868b
-
SSDEEP
49152:2uNfyTISADfA7v8ygD4DA+adwL/64yFE3tfv78+oeHlsun2qTHBCR/Q:2uJwGbUxDA4eStfboeH7nxYR/Q
Static task
static1
Behavioral task
behavioral1
Sample
25480dc89d202c2d696d27081d6e965e4278a7191f7cb732520535cecbb8d44c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
25480dc89d202c2d696d27081d6e965e4278a7191f7cb732520535cecbb8d44c.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
51.89.207.166:47909
-
auth_value
3a050df92d0cf082b2cdaf87863616be
Targets
-
-
Target
25480dc89d202c2d696d27081d6e965e4278a7191f7cb732520535cecbb8d44c.exe
-
Size
2.1MB
-
MD5
dac6eda1fe997400f98cebc36aa13301
-
SHA1
4c589bbaa0ac59da4060db5452cc85f69aaa81f4
-
SHA256
25480dc89d202c2d696d27081d6e965e4278a7191f7cb732520535cecbb8d44c
-
SHA512
2f088a83f4ea6836b4bfbb56e19942ecaa513915044e630dd2b08b023080a94eefb53c3fcea4c4a662fd8825a1eb90b47ab27e441f2b5b460b8f4f170b121371
-
SSDEEP
49152:V5Oaj/gtjDQypipWLn2zFScR+DOeQEitnYb1m8whw:V5nj/gaypismN+DhVitnYm8z
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-