General
-
Target
fbcd45b47c28ba4275e76079c58ce6d36386d0600d102ca29628973116a340d9
-
Size
2.9MB
-
Sample
220730-16bfbsbdcq
-
MD5
aaa3dbcc297ef4ff7329d42440509fdc
-
SHA1
30a8c945583ad1e7b1f8ce0b79ca42e11ea13cd2
-
SHA256
fbcd45b47c28ba4275e76079c58ce6d36386d0600d102ca29628973116a340d9
-
SHA512
2bb68efba4372294633a59d6720b87983d12bf1092dd21feb6eb8667b223cf114fa31346ec131746b92d9591202cf4934b5a0e3f8230119678d7309a0936c208
Static task
static1
Behavioral task
behavioral1
Sample
fbcd45b47c28ba4275e76079c58ce6d36386d0600d102ca29628973116a340d9.exe
Resource
win7-20220715-en
Malware Config
Extracted
redline
193.106.191.160:8673
194.93.2.28:21390
185.186.142.127:6737
-
auth_value
a92e5e3459b5f1ea8a76ec4f05c50c1e
Extracted
redline
@moriwWs
neredenkyor.xyz:81
-
auth_value
c2f987b4e6cd55ad1315311e92563eca
Targets
-
-
Target
fbcd45b47c28ba4275e76079c58ce6d36386d0600d102ca29628973116a340d9
-
Size
2.9MB
-
MD5
aaa3dbcc297ef4ff7329d42440509fdc
-
SHA1
30a8c945583ad1e7b1f8ce0b79ca42e11ea13cd2
-
SHA256
fbcd45b47c28ba4275e76079c58ce6d36386d0600d102ca29628973116a340d9
-
SHA512
2bb68efba4372294633a59d6720b87983d12bf1092dd21feb6eb8667b223cf114fa31346ec131746b92d9591202cf4934b5a0e3f8230119678d7309a0936c208
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
YTStealer payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-