General
-
Target
86313AF86B044FA4998F50C78A73E168D50D3A48D1E65D44584D6D5C7DF52B0D
-
Size
2.5MB
-
Sample
220812-bl7klahcb6
-
MD5
98180fcc5fd2a110e991fb70573ee290
-
SHA1
60cef139fb0b713caba022dc62f07a2a19f2fd01
-
SHA256
86313af86b044fa4998f50c78a73e168d50d3a48d1e65d44584d6d5c7df52b0d
-
SHA512
050a86eae43854c5858f781ed5897c6f44d467639132a5b335a523ebf294509919cb018dd782255f634efb8dc99f53c707773fff4b02ed1af5491df3af379d55
Static task
static1
Behavioral task
behavioral1
Sample
86313AF86B044FA4998F50C78A73E168D50D3A48D1E65D44584D6D5C7DF52B0D.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
86313AF86B044FA4998F50C78A73E168D50D3A48D1E65D44584D6D5C7DF52B0D.exe
Resource
win10-20220722-en
Malware Config
Extracted
redline
62.204.41.141:24758
-
auth_value
696026fc51b785eaab70bf29592a77da
Targets
-
-
Target
86313AF86B044FA4998F50C78A73E168D50D3A48D1E65D44584D6D5C7DF52B0D
-
Size
2.5MB
-
MD5
98180fcc5fd2a110e991fb70573ee290
-
SHA1
60cef139fb0b713caba022dc62f07a2a19f2fd01
-
SHA256
86313af86b044fa4998f50c78a73e168d50d3a48d1e65d44584d6d5c7df52b0d
-
SHA512
050a86eae43854c5858f781ed5897c6f44d467639132a5b335a523ebf294509919cb018dd782255f634efb8dc99f53c707773fff4b02ed1af5491df3af379d55
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
YTStealer payload
-
XMRig Miner payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-