General
-
Target
4407a748e233449d07c814035d0e56db.exe
-
Size
1.9MB
-
Sample
220414-n316csaeg9
-
MD5
4407a748e233449d07c814035d0e56db
-
SHA1
1dbc95d08dbae1fc1d6e6a4e2f87581ff25c7ec0
-
SHA256
2c047c4411660565df6518a63bb51220e78a0b51fecdc0c746b270597377669e
-
SHA512
e50f350f04a15d9391231a7a61b4c61eaa3c3e8518bd48a9dde2fb63fec873b861e147982764308e9f7daca3d3f40f4ca2256cd6defeb304b9cde073a820fbb4
Static task
static1
Behavioral task
behavioral1
Sample
4407a748e233449d07c814035d0e56db.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
4407a748e233449d07c814035d0e56db.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
redline
@ansdvsvsvd
46.8.220.88:65531
-
auth_value
d7b874c6650abbcb219b4f56f4676fee
Targets
-
-
Target
4407a748e233449d07c814035d0e56db.exe
-
Size
1.9MB
-
MD5
4407a748e233449d07c814035d0e56db
-
SHA1
1dbc95d08dbae1fc1d6e6a4e2f87581ff25c7ec0
-
SHA256
2c047c4411660565df6518a63bb51220e78a0b51fecdc0c746b270597377669e
-
SHA512
e50f350f04a15d9391231a7a61b4c61eaa3c3e8518bd48a9dde2fb63fec873b861e147982764308e9f7daca3d3f40f4ca2256cd6defeb304b9cde073a820fbb4
-
Meta Stealer Stealer
Meta Stealer steals passwords stored in browsers, written in C++.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-