General
-
Target
bcbd2fe43df8ff15d3e4503438a54951.exe
-
Size
3.9MB
-
Sample
220813-gyq19sghg9
-
MD5
bcbd2fe43df8ff15d3e4503438a54951
-
SHA1
2c3848c520573916606777df889ab7e0f9a84ea3
-
SHA256
dde8987c6126117794a9922ce253a735bd113100a8e56412b518bd9349e70d83
-
SHA512
b72ee7273a6869b0f90b35a6e944c2c92030d3a219504e70ceaa843b592ef97331cc621c4bf0aca2daa78017b94a0402211c7d2f0becca7926ee97c30be3959d
Static task
static1
Behavioral task
behavioral1
Sample
bcbd2fe43df8ff15d3e4503438a54951.exe
Resource
win7-20220812-en
Malware Config
Extracted
redline
185.215.113.83:60722
-
auth_value
a1b687bd55ee0ce016df2e017a162814
Targets
-
-
Target
bcbd2fe43df8ff15d3e4503438a54951.exe
-
Size
3.9MB
-
MD5
bcbd2fe43df8ff15d3e4503438a54951
-
SHA1
2c3848c520573916606777df889ab7e0f9a84ea3
-
SHA256
dde8987c6126117794a9922ce253a735bd113100a8e56412b518bd9349e70d83
-
SHA512
b72ee7273a6869b0f90b35a6e944c2c92030d3a219504e70ceaa843b592ef97331cc621c4bf0aca2daa78017b94a0402211c7d2f0becca7926ee97c30be3959d
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
YTStealer payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-