General
-
Target
Launcher.exe
-
Size
3.9MB
-
Sample
220812-zdj2bscaa4
-
MD5
7731bbc6b6dcfee6191187e417b48570
-
SHA1
8c26762bf8cec71b270d2c68c07669dd06940d8c
-
SHA256
200f4faeff4a788b4a76b60c76f928d0b4418c7fc568eb7911177b51392739d1
-
SHA512
d56b8c2149029813fe11cb08deb03192279ecb7e9d373e636f7e20e529c7a5cb7e4fcdf8984eb4c943bbb44fd3f982f83b1a1667c884495791831391e0abe5d3
Static task
static1
Behavioral task
behavioral1
Sample
Launcher.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Launcher.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
redline
62.204.41.141:24758
-
auth_value
2c7c599df95f4eb1a36237ba938268a0
Targets
-
-
Target
Launcher.exe
-
Size
3.9MB
-
MD5
7731bbc6b6dcfee6191187e417b48570
-
SHA1
8c26762bf8cec71b270d2c68c07669dd06940d8c
-
SHA256
200f4faeff4a788b4a76b60c76f928d0b4418c7fc568eb7911177b51392739d1
-
SHA512
d56b8c2149029813fe11cb08deb03192279ecb7e9d373e636f7e20e529c7a5cb7e4fcdf8984eb4c943bbb44fd3f982f83b1a1667c884495791831391e0abe5d3
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
YTStealer payload
-
XMRig Miner payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-