General
-
Target
ba4f41c49113e6f68569cabb3b7c9f4dccdab49668b2342badb199e4a5a25024
-
Size
3.9MB
-
Sample
220816-16b2vsaaf8
-
MD5
70c4a1e5ce70e0ec16fc0c6d0f0384d9
-
SHA1
2533d9a175e8617512fba948557a302c7d4683a2
-
SHA256
ba4f41c49113e6f68569cabb3b7c9f4dccdab49668b2342badb199e4a5a25024
-
SHA512
576b48ff847c2fac88d5f48133cc7ce36ddfeccb923fcdcb9847b7a9586cc531b2507557c24bb9889b6a4f7db5b864a5a316136b32c151cce2bae034fda9a89a
-
SSDEEP
98304:bSmRn0VvVQnmjI8k0LUOUgJ9BouaPkeOgUiBwkcX:WlVyWUiUg7+jO7iBwR
Static task
static1
Behavioral task
behavioral1
Sample
ba4f41c49113e6f68569cabb3b7c9f4dccdab49668b2342badb199e4a5a25024.exe
Resource
win7-20220812-en
Malware Config
Extracted
redline
193.106.191.160:8673
-
auth_value
a92e5e3459b5f1ea8a76ec4f05c50c1e
Targets
-
-
Target
ba4f41c49113e6f68569cabb3b7c9f4dccdab49668b2342badb199e4a5a25024
-
Size
3.9MB
-
MD5
70c4a1e5ce70e0ec16fc0c6d0f0384d9
-
SHA1
2533d9a175e8617512fba948557a302c7d4683a2
-
SHA256
ba4f41c49113e6f68569cabb3b7c9f4dccdab49668b2342badb199e4a5a25024
-
SHA512
576b48ff847c2fac88d5f48133cc7ce36ddfeccb923fcdcb9847b7a9586cc531b2507557c24bb9889b6a4f7db5b864a5a316136b32c151cce2bae034fda9a89a
-
SSDEEP
98304:bSmRn0VvVQnmjI8k0LUOUgJ9BouaPkeOgUiBwkcX:WlVyWUiUg7+jO7iBwR
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
YTStealer payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-