General
-
Target
config.exe
-
Size
1.8MB
-
Sample
220727-h721kafag8
-
MD5
69ece8d218a832b487ddb81d067342c8
-
SHA1
9fa463b8b0a1abc771026bf1dd16e4b65d5f9f2f
-
SHA256
1a36a58f9a4b757a07f99d0fc22c0e8fce99bf5191ac5cad4047acd3bb197961
-
SHA512
10c58bdcd67d041f211c70b506454ca90a7216a95ab30ddf12281539daee55f8a302d88345280fd8c571189d0fb9875e874d01199ba7770e4ca6319a2ceb7468
Static task
static1
Behavioral task
behavioral1
Sample
config.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
config.exe
Resource
win10-20220722-en
Behavioral task
behavioral3
Sample
config.exe
Resource
win10v2004-20220721-en
Behavioral task
behavioral4
Sample
config.exe
Resource
win11-20220223-en
Malware Config
Extracted
redline
62.204.41.141:24758
-
auth_value
d572eadd06647f5f8c753c5b0a5ace1f
Targets
-
-
Target
config.exe
-
Size
1.8MB
-
MD5
69ece8d218a832b487ddb81d067342c8
-
SHA1
9fa463b8b0a1abc771026bf1dd16e4b65d5f9f2f
-
SHA256
1a36a58f9a4b757a07f99d0fc22c0e8fce99bf5191ac5cad4047acd3bb197961
-
SHA512
10c58bdcd67d041f211c70b506454ca90a7216a95ab30ddf12281539daee55f8a302d88345280fd8c571189d0fb9875e874d01199ba7770e4ca6319a2ceb7468
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
YTStealer payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-