General
-
Target
f9b5057081ca6e37c63a992234668b244551053a63582.exe
-
Size
2.5MB
-
Sample
220730-qdrxhabbe7
-
MD5
5251c3cd61396eeb732de01832040c6f
-
SHA1
9523aca0dacb3e25e234157b69deca035564786f
-
SHA256
f9b5057081ca6e37c63a992234668b244551053a63582ee5bcd24e9e06222278
-
SHA512
42c5a0a4a1fa1fcc33d4411b6b04e6061123a5b60c75a06d309693a67795fe0f2a0f77469063c3451530d8bb31093cb8fd4af3946d2deb99f751503340bd4bea
Static task
static1
Behavioral task
behavioral1
Sample
f9b5057081ca6e37c63a992234668b244551053a63582.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
f9b5057081ca6e37c63a992234668b244551053a63582.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
redline
193.106.191.160:8673
-
auth_value
7824e9f60118486d456c723edbe36fe1
Targets
-
-
Target
f9b5057081ca6e37c63a992234668b244551053a63582.exe
-
Size
2.5MB
-
MD5
5251c3cd61396eeb732de01832040c6f
-
SHA1
9523aca0dacb3e25e234157b69deca035564786f
-
SHA256
f9b5057081ca6e37c63a992234668b244551053a63582ee5bcd24e9e06222278
-
SHA512
42c5a0a4a1fa1fcc33d4411b6b04e6061123a5b60c75a06d309693a67795fe0f2a0f77469063c3451530d8bb31093cb8fd4af3946d2deb99f751503340bd4bea
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
YTStealer payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-