General
-
Target
B59600E131D839BCA09180B6A1624EC0C8ED6A89F7B5F266E00D466A08BBBF50
-
Size
2.4MB
-
Sample
220812-bwmm6shde4
-
MD5
eb787c21d13fea35fdef02a4108a3837
-
SHA1
e49bdd16b109886c7bec44945dd442b815c85540
-
SHA256
b59600e131d839bca09180b6a1624ec0c8ed6a89f7b5f266e00d466a08bbbf50
-
SHA512
612e2428af924cd5f666542ddcc2842fbda8691de6659a9a7ea50f7d28ad11bbbd8a36772f0ab3dca6be86f29876ff6a12cb6e635d9a8788a9d4a50d8891ba64
Static task
static1
Behavioral task
behavioral1
Sample
B59600E131D839BCA09180B6A1624EC0C8ED6A89F7B5F266E00D466A08BBBF50.exe
Resource
win7-20220718-en
Malware Config
Extracted
redline
185.215.113.83:60722
-
auth_value
dd55e2051534eafb87cf91977b6d459b
Targets
-
-
Target
B59600E131D839BCA09180B6A1624EC0C8ED6A89F7B5F266E00D466A08BBBF50
-
Size
2.4MB
-
MD5
eb787c21d13fea35fdef02a4108a3837
-
SHA1
e49bdd16b109886c7bec44945dd442b815c85540
-
SHA256
b59600e131d839bca09180b6a1624ec0c8ed6a89f7b5f266e00d466a08bbbf50
-
SHA512
612e2428af924cd5f666542ddcc2842fbda8691de6659a9a7ea50f7d28ad11bbbd8a36772f0ab3dca6be86f29876ff6a12cb6e635d9a8788a9d4a50d8891ba64
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
YTStealer payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-