General
-
Target
b7b407d27da2cb25f7762c1346c2d39f970bca7bbd65c668aac18c90f88ab2d3
-
Size
4.5MB
-
Sample
220805-pvl7xaaeam
-
MD5
10a5e7d6a22913e2396c8b55a1cc3753
-
SHA1
fe3d862d80cafceb203bc429258a92f568cebde6
-
SHA256
b7b407d27da2cb25f7762c1346c2d39f970bca7bbd65c668aac18c90f88ab2d3
-
SHA512
d713b7d16f01c42cec294eaf081cd73749822cfde298e2f060d44200b1a7cab1076ea5b6d907e2e7952a1d8d26f01ddea9f2760f34813c477baa759c12aa432a
Static task
static1
Behavioral task
behavioral1
Sample
b7b407d27da2cb25f7762c1346c2d39f970bca7bbd65c668aac18c90f88ab2d3.exe
Resource
win7-20220715-en
Malware Config
Extracted
redline
185.200.191.18:80
-
auth_value
f7903777691eaec1059d585ff58166bc
Targets
-
-
Target
b7b407d27da2cb25f7762c1346c2d39f970bca7bbd65c668aac18c90f88ab2d3
-
Size
4.5MB
-
MD5
10a5e7d6a22913e2396c8b55a1cc3753
-
SHA1
fe3d862d80cafceb203bc429258a92f568cebde6
-
SHA256
b7b407d27da2cb25f7762c1346c2d39f970bca7bbd65c668aac18c90f88ab2d3
-
SHA512
d713b7d16f01c42cec294eaf081cd73749822cfde298e2f060d44200b1a7cab1076ea5b6d907e2e7952a1d8d26f01ddea9f2760f34813c477baa759c12aa432a
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
YTStealer payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-