General
-
Target
263E7FBF72BD53E3793128E84B0A10837BC5712095E9EE46A9B1DCA0EE059A59
-
Size
2.5MB
-
Sample
220812-a4yvqsghc7
-
MD5
bd5c4985195e675f6f2dd7743e451551
-
SHA1
f314911b7443dece9544b5f8e2b52df3d323bc0a
-
SHA256
263e7fbf72bd53e3793128e84b0a10837bc5712095e9ee46a9b1dca0ee059a59
-
SHA512
116b85a314a1ff0f43eb1e1ee96704191e98460e9af7aec473ceff0b66d7339a6751f305740848cefa55f4c33fd0e236b9dc4196e607296eed3018aafaa524e7
Static task
static1
Behavioral task
behavioral1
Sample
263E7FBF72BD53E3793128E84B0A10837BC5712095E9EE46A9B1DCA0EE059A59.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
263E7FBF72BD53E3793128E84B0A10837BC5712095E9EE46A9B1DCA0EE059A59.exe
Resource
win10-20220718-en
Malware Config
Extracted
redline
62.204.41.141:24758
-
auth_value
6b23940bb97470910c89668d85ae8df9
Targets
-
-
Target
263E7FBF72BD53E3793128E84B0A10837BC5712095E9EE46A9B1DCA0EE059A59
-
Size
2.5MB
-
MD5
bd5c4985195e675f6f2dd7743e451551
-
SHA1
f314911b7443dece9544b5f8e2b52df3d323bc0a
-
SHA256
263e7fbf72bd53e3793128e84b0a10837bc5712095e9ee46a9b1dca0ee059a59
-
SHA512
116b85a314a1ff0f43eb1e1ee96704191e98460e9af7aec473ceff0b66d7339a6751f305740848cefa55f4c33fd0e236b9dc4196e607296eed3018aafaa524e7
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
YTStealer payload
-
XMRig Miner payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-