General

  • Target

    config.exe

  • Size

    1.8MB

  • Sample

    220727-h721kafag8

  • MD5

    69ece8d218a832b487ddb81d067342c8

  • SHA1

    9fa463b8b0a1abc771026bf1dd16e4b65d5f9f2f

  • SHA256

    1a36a58f9a4b757a07f99d0fc22c0e8fce99bf5191ac5cad4047acd3bb197961

  • SHA512

    10c58bdcd67d041f211c70b506454ca90a7216a95ab30ddf12281539daee55f8a302d88345280fd8c571189d0fb9875e874d01199ba7770e4ca6319a2ceb7468

Malware Config

Extracted

Family

redline

C2

62.204.41.141:24758

Attributes
  • auth_value

    d572eadd06647f5f8c753c5b0a5ace1f

Targets

    • Target

      config.exe

    • Size

      1.8MB

    • MD5

      69ece8d218a832b487ddb81d067342c8

    • SHA1

      9fa463b8b0a1abc771026bf1dd16e4b65d5f9f2f

    • SHA256

      1a36a58f9a4b757a07f99d0fc22c0e8fce99bf5191ac5cad4047acd3bb197961

    • SHA512

      10c58bdcd67d041f211c70b506454ca90a7216a95ab30ddf12281539daee55f8a302d88345280fd8c571189d0fb9875e874d01199ba7770e4ca6319a2ceb7468

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks