General
-
Target
a1321aea2ae27640565f0b8cfed2e4a6.exe
-
Size
1.6MB
-
Sample
220414-r6ey3sdbbl
-
MD5
a1321aea2ae27640565f0b8cfed2e4a6
-
SHA1
d4cbc6fdbe1435f3d614a21db2f369be40c0fc76
-
SHA256
986b1e107fdcf5ba3eec492626b08ea3d4e2091931d10b196a11c790a6f43d0c
-
SHA512
913fdfa9d7c81a30dc4742f385db355bf53abb8138ccf587f2ebceb0d2f890c47a0f5c1d103e7ab919271503c682f2500df7a58c6454376665537405730cd9dc
Static task
static1
Behavioral task
behavioral1
Sample
a1321aea2ae27640565f0b8cfed2e4a6.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
a1321aea2ae27640565f0b8cfed2e4a6.exe
Resource
win10v2004-20220331-en
Malware Config
Extracted
redline
91.243.59.43:41097
-
auth_value
d9c935b15ec629aafe8b28a63a1343f9
Targets
-
-
Target
a1321aea2ae27640565f0b8cfed2e4a6.exe
-
Size
1.6MB
-
MD5
a1321aea2ae27640565f0b8cfed2e4a6
-
SHA1
d4cbc6fdbe1435f3d614a21db2f369be40c0fc76
-
SHA256
986b1e107fdcf5ba3eec492626b08ea3d4e2091931d10b196a11c790a6f43d0c
-
SHA512
913fdfa9d7c81a30dc4742f385db355bf53abb8138ccf587f2ebceb0d2f890c47a0f5c1d103e7ab919271503c682f2500df7a58c6454376665537405730cd9dc
Score10/10-
Meta Stealer Stealer
Meta Stealer steals passwords stored in browsers, written in C++.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-