General
-
Target
4055a6113ddad0ab1e7ea173d97e9b86d89c80104eb6a7b59b4e50dddce8684e
-
Size
1.7MB
-
Sample
241111-lwb7js1lfq
-
MD5
371da32c92c7823216d00409769fce25
-
SHA1
205e6fbd0f96951141e04b2364a9ab486cefdd20
-
SHA256
4055a6113ddad0ab1e7ea173d97e9b86d89c80104eb6a7b59b4e50dddce8684e
-
SHA512
948fe86182d73ef2a09d25e7ea67e6f90fcd7f41829c37d41c23705c512981f6a26b895f445dff34c1a2e09bc4b4514c43de4bb124113f5fe4920cdfd8120489
-
SSDEEP
49152:n+sHdhtJYk989f88kfmPCkmw+fQbY17gec3i8kB:n3Hdh8k98988kfmPCkmw+fQigec3PI
Static task
static1
Behavioral task
behavioral1
Sample
90d635817607ef7037d5f3c3d516cbce989155590946c088cabb9f80bf7fbfeb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
90d635817607ef7037d5f3c3d516cbce989155590946c088cabb9f80bf7fbfeb.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
51.210.137.6:47909
-
auth_value
3a050df92d0cf082b2cdaf87863616be
Targets
-
-
Target
90d635817607ef7037d5f3c3d516cbce989155590946c088cabb9f80bf7fbfeb.exe
-
Size
1.8MB
-
MD5
d511992136c2cda00b468ce9e30b0cf5
-
SHA1
e947bcc2b9e603392841fafe4fcf4c2e23fa42da
-
SHA256
90d635817607ef7037d5f3c3d516cbce989155590946c088cabb9f80bf7fbfeb
-
SHA512
dbd145f438f1b07c2051437c9c2dfff3cad2d5402abbd52df4ffc5d06b4aa6c2628bf62f3f6dc300079170adf3fc7543316eff66f4a62d13a2fd8760945d4a2d
-
SSDEEP
49152:V5OzHCcQhi/kByJ4g3AVm5c3+12bk7vRDB3VwMylYZRL:V5ph3W4wAycuQbk1FFwvYf
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-