General
-
Target
077081409292056cd64db1b59d87aa20.exe
-
Size
3.9MB
-
Sample
220813-gyq19sghh2
-
MD5
077081409292056cd64db1b59d87aa20
-
SHA1
0d1355049116892ff50f51644713e191cab962a9
-
SHA256
b96e04e692837a4e53e4afeabdf02113d2a02831a0d31a0a4a4554d4fcedb58a
-
SHA512
17b1a80db9e557c5241307ddb169ba27e2befacfac81e9e39085197cc02c0c04c0760b67d54deb743619f74353193e83c243ad3f583a6d9dc07d62988533acde
Static task
static1
Behavioral task
behavioral1
Sample
077081409292056cd64db1b59d87aa20.exe
Resource
win7-20220812-en
Malware Config
Extracted
redline
193.106.191.160:8673
-
auth_value
f851075e7177a68d1405b67a1fdef844
Targets
-
-
Target
077081409292056cd64db1b59d87aa20.exe
-
Size
3.9MB
-
MD5
077081409292056cd64db1b59d87aa20
-
SHA1
0d1355049116892ff50f51644713e191cab962a9
-
SHA256
b96e04e692837a4e53e4afeabdf02113d2a02831a0d31a0a4a4554d4fcedb58a
-
SHA512
17b1a80db9e557c5241307ddb169ba27e2befacfac81e9e39085197cc02c0c04c0760b67d54deb743619f74353193e83c243ad3f583a6d9dc07d62988533acde
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
YTStealer payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-