General
-
Target
setup.exe
-
Size
7.8MB
-
Sample
220812-fn4zpsbdf9
-
MD5
785ec578688eea5954c58fc5aaae01db
-
SHA1
631e3dcb1e26ca403dcb27b3b8ca02e43fb7f892
-
SHA256
de422863cd1d6fc32ed020e93643e24f11dfed84d7ac62de2b8e9d0b38563237
-
SHA512
085683845f328b1675676297bbaec7634daf8aae4391d82fc66bbad6a36b1f630a6ab7184b3ad7701fb1922d53bab8f70101261124bc3bb85e1b8a8e964f20eb
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20220718-en
Malware Config
Extracted
redline
185.200.191.18:80
-
auth_value
34e02e45e2e86edae48817cd60b40271
Targets
-
-
Target
setup.exe
-
Size
7.8MB
-
MD5
785ec578688eea5954c58fc5aaae01db
-
SHA1
631e3dcb1e26ca403dcb27b3b8ca02e43fb7f892
-
SHA256
de422863cd1d6fc32ed020e93643e24f11dfed84d7ac62de2b8e9d0b38563237
-
SHA512
085683845f328b1675676297bbaec7634daf8aae4391d82fc66bbad6a36b1f630a6ab7184b3ad7701fb1922d53bab8f70101261124bc3bb85e1b8a8e964f20eb
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
YTStealer payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-