General
-
Target
Launcher.exe
-
Size
4.6MB
-
Sample
220817-mlhr1secgj
-
MD5
4612516fca7a6fc9c393a76859d89539
-
SHA1
4d854c616dca1833ee3bb64befb39676a4cd26c3
-
SHA256
097c24ae162bd92ddfacc1276aada59fa7d058837c359a3f3a37f2ddc763e841
-
SHA512
700125943a1e7fca1f161c869cf7553e4462bd770763ad49e3ef1591d77ee521ff635b721af241718413442a5ecf3972981579396fd52472e4a5ddcc89b3e290
-
SSDEEP
98304:PlTHpj34u1p6J3wQ98sNkEqKKe5hJe8FeT:PlZtO3wQ98sNVThJe8s
Static task
static1
Behavioral task
behavioral1
Sample
Launcher.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Launcher.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
redline
62.204.41.141:24758
-
auth_value
2c7c599df95f4eb1a36237ba938268a0
Targets
-
-
Target
Launcher.exe
-
Size
4.6MB
-
MD5
4612516fca7a6fc9c393a76859d89539
-
SHA1
4d854c616dca1833ee3bb64befb39676a4cd26c3
-
SHA256
097c24ae162bd92ddfacc1276aada59fa7d058837c359a3f3a37f2ddc763e841
-
SHA512
700125943a1e7fca1f161c869cf7553e4462bd770763ad49e3ef1591d77ee521ff635b721af241718413442a5ecf3972981579396fd52472e4a5ddcc89b3e290
-
SSDEEP
98304:PlTHpj34u1p6J3wQ98sNkEqKKe5hJe8FeT:PlZtO3wQ98sNVThJe8s
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
YTStealer payload
-
XMRig Miner payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-