General
-
Target
ae54f01f90675f9268588f7eab938ce7.exe
-
Size
1.8MB
-
Sample
220414-v9zpfageh3
-
MD5
ae54f01f90675f9268588f7eab938ce7
-
SHA1
df9b0a7a6280b8bb8bb866a672bc7ff2736c29b0
-
SHA256
1b6dd998ab259fc57bf7d9a35381fdfe4f63f80eac561e9842613132812f165d
-
SHA512
9616b482d4707b16b402722924c755245b36da5b44a04e59b8803058900f66be001bbd51c724bb9a10b933829a356f42f9bab9e5d55a49b60bda1b926da210ee
Static task
static1
Behavioral task
behavioral1
Sample
ae54f01f90675f9268588f7eab938ce7.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ae54f01f90675f9268588f7eab938ce7.exe
Resource
win10v2004-20220310-en
Malware Config
Extracted
redline
@devilstationsix66
185.215.113.80:27715
-
auth_value
908d4628b659b61e0a6c10f5bed9fc95
Targets
-
-
Target
ae54f01f90675f9268588f7eab938ce7.exe
-
Size
1.8MB
-
MD5
ae54f01f90675f9268588f7eab938ce7
-
SHA1
df9b0a7a6280b8bb8bb866a672bc7ff2736c29b0
-
SHA256
1b6dd998ab259fc57bf7d9a35381fdfe4f63f80eac561e9842613132812f165d
-
SHA512
9616b482d4707b16b402722924c755245b36da5b44a04e59b8803058900f66be001bbd51c724bb9a10b933829a356f42f9bab9e5d55a49b60bda1b926da210ee
-
Meta Stealer Stealer
Meta Stealer steals passwords stored in browsers, written in C++.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
XMRig Miner Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-