General
-
Target
8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5
-
Size
1.7MB
-
Sample
220731-edtkjsgbcr
-
MD5
44df72212127215eff6b18cc9f250971
-
SHA1
497cfce96217cfbbd6fcd14d9af6b6114eaecd9f
-
SHA256
8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5
-
SHA512
9213bcbf112e1a4ceb584292d8d86005f636b071b154ab7cee90745965e148d7e145d22d21cd15b8431a48c8c9d2b310b5ab04c06fc2a75289d020a3d1a4a03e
Static task
static1
Behavioral task
behavioral1
Sample
8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5.exe
Resource
win7-20220715-en
Malware Config
Extracted
redline
185.186.142.127:6737
193.106.191.160:8673
194.93.2.28:21390
-
auth_value
1fce8029e8fab4e62b767b33e52bdb9e
Extracted
redline
@moriwWs
neredenkyor.xyz:81
-
auth_value
c2f987b4e6cd55ad1315311e92563eca
Targets
-
-
Target
8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5
-
Size
1.7MB
-
MD5
44df72212127215eff6b18cc9f250971
-
SHA1
497cfce96217cfbbd6fcd14d9af6b6114eaecd9f
-
SHA256
8d9c88907d23e14e2af198f4f81eec99674eaa5cf0a1770286724070b18159d5
-
SHA512
9213bcbf112e1a4ceb584292d8d86005f636b071b154ab7cee90745965e148d7e145d22d21cd15b8431a48c8c9d2b310b5ab04c06fc2a75289d020a3d1a4a03e
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
YTStealer payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-