General
-
Target
eb695c92750535c6cf48087abd5efbadcf2aa709fe64c34f32524c5800ef2d9f
-
Size
1.9MB
-
Sample
241111-dyxx2asclc
-
MD5
26ed4e759963a6cc01f0fac289132424
-
SHA1
017c76f7043bf39e0ec21efbd84aea32c86c981c
-
SHA256
eb695c92750535c6cf48087abd5efbadcf2aa709fe64c34f32524c5800ef2d9f
-
SHA512
065ce6ad0bebb37011be0f1c5968c21b74c4817410204a85053206bcbbe4075fef4e4657aaae4900a611ff291543cfdf4a021fdae3e9b7b25940af4d91196ae7
-
SSDEEP
49152:EKDBXouwubtXdr7Xph5999ie8JiMs47nS+OVszsYyMDQbHfSr972:E+wu5tfZh799ieFT+AksYLDQbfst2
Static task
static1
Behavioral task
behavioral1
Sample
95702883e883a7fa3f7f20ecf6713b03cd00469644d777b73f36351db97ef3c2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
95702883e883a7fa3f7f20ecf6713b03cd00469644d777b73f36351db97ef3c2.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
51.210.137.6:47909
-
auth_value
3a050df92d0cf082b2cdaf87863616be
Targets
-
-
Target
95702883e883a7fa3f7f20ecf6713b03cd00469644d777b73f36351db97ef3c2.exe
-
Size
2.1MB
-
MD5
d1433f5b2eada044678af57d87ee31e5
-
SHA1
0493152ee8d18335fa5043be0f80d12331f2ea00
-
SHA256
95702883e883a7fa3f7f20ecf6713b03cd00469644d777b73f36351db97ef3c2
-
SHA512
80dcff2d4e4001d8adb4eff0963921e4335c80bde476492996e74762918663bc84627ae9ca73023f75f799143d3101939ce0a599fafa164f9750481e4bb680c2
-
SSDEEP
49152:V5OaOl3UYvrbFueD40EJbAXOUghn/WsAXZ//t:V59Q3UYvrBusTM8OUgNLY
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-