General
-
Target
Best Loader.rar
-
Size
12.2MB
-
Sample
220808-3zewaacab9
-
MD5
40ee1f975b03dcbb16d79228d0d30c99
-
SHA1
0fc0e02241a1f249dc836b6af52ebcb9aea5aeb8
-
SHA256
20604c0a935b40dae9f6f791deddf9f6c37524d6bbfb90b1ee7e6a6b339c61a9
-
SHA512
3b794c4b6beb85177b775c6d9e9db8b2d104e23abacb79bb59af71cb81bb35c96ed50402749398ab7268f98b09c7a1bc1096eb78e3ec2cb564fd120fc888c249
Static task
static1
Behavioral task
behavioral1
Sample
Loader.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
Loader.exe
Resource
win10v2004-20220721-en
Behavioral task
behavioral3
Sample
Loader2.exe
Resource
win7-20220715-en
Malware Config
Extracted
redline
185.200.191.18:80
-
auth_value
c7fe4e520a2358e148de28eb0d3f7a5e
Targets
-
-
Target
Loader.exe
-
Size
2.3MB
-
MD5
2c3fad8035fdf8f16d554e6054b028fa
-
SHA1
2c494bf2b1ff118c06a970ad235b73b0ca9cc9a0
-
SHA256
d246fd45d287b669b26347e38d9231801d85b6e5baf8485f093090a7289aafbe
-
SHA512
54fde453ca96d3a6879b47cccb7933880481fd2e4a527908eb6e57acfc640f50a486cb594c15df0422e3e6268e1e8bd2c4186e73ee33d606d83529e9dd105e7d
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-
-
-
Target
Loader2.exe
-
Size
4.6MB
-
MD5
8b748c19d519e352be4672fbc6b3561d
-
SHA1
ec7068896649caac57a04bf0fc101ddb4749861c
-
SHA256
b95da2213bec289569d3d68a8e461b74b78c86dfcc1f5a794dceec5de1b6a811
-
SHA512
f59964ccc2f3552e006a9ff1592aec7747d5355c053d9dd24e3fb5e907990e2339c6d37ea96243af88ceed8bd63318444143231f7d37b7966092be23e903833b
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
YTStealer payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-