General
-
Target
Installer.rar
-
Size
5.2MB
-
Sample
220805-bb2xcsebdm
-
MD5
b00d0f05bae2aeeaaa1f4773ec8e7c55
-
SHA1
0dacdea1d730258689e1d6c39261de7fd79b3d18
-
SHA256
3a358eb87597461480a5ad40c1d4e5ab736e4eba08cb98d7bd66bec837aea42c
-
SHA512
9c9441063c880809b43aab465e1876e07e39bdcf245b35952453cb4ce80193469bf83f658f1e45f5e940ea873c601319b4a474e643b6c2829ca22cf4d13917d8
Static task
static1
Malware Config
Extracted
redline
cc
31.41.244.109:3590
-
auth_value
7c92cd877c035439a140a8047908d9e1
Targets
-
-
Target
Installer/Setup.exe
-
Size
4.8MB
-
MD5
e802a10b92d452355473e7098127cd6a
-
SHA1
fcf838237925661f674be8b121c4989c091ed9fd
-
SHA256
ffa88e2f4c4cffc25cfa7e87f7b8685e5e31f3dfa372e9e0a4c5d85f880dbb94
-
SHA512
b5f2255f8507b9c5fb1671500c6a1b4b3a34428552e494f8c4a6a9713304c18d79a930f6b3716971c903c4cd79a681b5bc998cff835b2e5794cc081b2ca27128
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
YTStealer payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-