General
-
Target
680F28FC36441A05EF4A4A19B64EE60C73C2FB9653D26B028D64E93ABA781B32
-
Size
2.5MB
-
Sample
220812-beek8shag5
-
MD5
b93ca6dd6a570b6737c161a6c02e4c47
-
SHA1
d97c8f1fa60237963a61b2320aa43c01b8987634
-
SHA256
680f28fc36441a05ef4a4a19b64ee60c73c2fb9653d26b028d64e93aba781b32
-
SHA512
37728d2af479067109ae9177b1a4a19e9f40bead9ed112e5b52bf4618b97f8a620597ff4e66e464196076321513a069d709f62ea92ae179c23a18296ef8c88c6
Static task
static1
Behavioral task
behavioral1
Sample
680F28FC36441A05EF4A4A19B64EE60C73C2FB9653D26B028D64E93ABA781B32.exe
Resource
win7-20220718-en
Malware Config
Extracted
redline
185.215.113.23:15912
-
auth_value
ca11d6bb68385493a28fdddb02897eaf
Targets
-
-
Target
680F28FC36441A05EF4A4A19B64EE60C73C2FB9653D26B028D64E93ABA781B32
-
Size
2.5MB
-
MD5
b93ca6dd6a570b6737c161a6c02e4c47
-
SHA1
d97c8f1fa60237963a61b2320aa43c01b8987634
-
SHA256
680f28fc36441a05ef4a4a19b64ee60c73c2fb9653d26b028d64e93aba781b32
-
SHA512
37728d2af479067109ae9177b1a4a19e9f40bead9ed112e5b52bf4618b97f8a620597ff4e66e464196076321513a069d709f62ea92ae179c23a18296ef8c88c6
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
YTStealer payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-