General
-
Target
setup.exe
-
Size
7.8MB
-
Sample
220816-hh292agce3
-
MD5
d991180c8b4a68acbe8666da1269a2c5
-
SHA1
7c2e47ba170b846c02ff1a125a4dbb7e7f5fe98f
-
SHA256
4be214488130c9e816fa0e0db8f9bf5e6b0ee4d0f0910e4ea4c80a3806b55047
-
SHA512
5c75d5ff567503f9eed3084e0ee68349301e4c63d92647c65b1374a5ace8164e4cbfbaf7da727bc83f9d60b3279898547836b0099a9d32aa5e205ed074491349
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20220812-en
Malware Config
Extracted
redline
185.200.191.18:80
-
auth_value
02ec41e0225b95fefa16db6d70c6bb1e
Targets
-
-
Target
setup.exe
-
Size
7.8MB
-
MD5
d991180c8b4a68acbe8666da1269a2c5
-
SHA1
7c2e47ba170b846c02ff1a125a4dbb7e7f5fe98f
-
SHA256
4be214488130c9e816fa0e0db8f9bf5e6b0ee4d0f0910e4ea4c80a3806b55047
-
SHA512
5c75d5ff567503f9eed3084e0ee68349301e4c63d92647c65b1374a5ace8164e4cbfbaf7da727bc83f9d60b3279898547836b0099a9d32aa5e205ed074491349
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
YTStealer payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-