General
-
Target
503fb1498e1c257cf61ade325e9a3a60.exe
-
Size
491KB
-
Sample
220413-yemyyafecn
-
MD5
503fb1498e1c257cf61ade325e9a3a60
-
SHA1
786094aece0a643b4924b02ef98b82c8585394f1
-
SHA256
32c1e1a834294cc3b4ce9c790c8faf4bd218412859b55b21129ffe991064eeae
-
SHA512
4b8eb12a82275ae1e084a76aea4293bc502ec71bfef100bf0391e836b520701374430415aac6a5b6b9bf89e815b989f87c0505721d2cbd153b040239c2d246e1
Static task
static1
Behavioral task
behavioral1
Sample
503fb1498e1c257cf61ade325e9a3a60.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
503fb1498e1c257cf61ade325e9a3a60.exe
Resource
win10v2004-20220310-en
Malware Config
Extracted
redline
AUS
147.189.161.112:42516
-
auth_value
2e0aea8f686e4f39fb1ab50a9d815c7c
Targets
-
-
Target
503fb1498e1c257cf61ade325e9a3a60.exe
-
Size
491KB
-
MD5
503fb1498e1c257cf61ade325e9a3a60
-
SHA1
786094aece0a643b4924b02ef98b82c8585394f1
-
SHA256
32c1e1a834294cc3b4ce9c790c8faf4bd218412859b55b21129ffe991064eeae
-
SHA512
4b8eb12a82275ae1e084a76aea4293bc502ec71bfef100bf0391e836b520701374430415aac6a5b6b9bf89e815b989f87c0505721d2cbd153b040239c2d246e1
-
Meta Stealer Stealer
Meta Stealer steals passwords stored in browsers, written in C++.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-