General
-
Target
tmp
-
Size
163KB
-
Sample
220822-m63mxsehaq
-
MD5
af477d25b88a0059ec73f7f595437162
-
SHA1
7b13ff0f521763da35e136b910418f13d0b0fb88
-
SHA256
fae6e271a14675614d3d808555963b31b8e03bad2400f87f2cd2767628b077e5
-
SHA512
304ae1af571f3f442b3945969476de810aec38e36affa87577ede7746704f13ae4bee0a870bed9ec1d055b7b34d4879af154eae6ebd9b127a545fea12c809624
-
SSDEEP
3072:bvhwm6lzJUY8k2yIBZf32NwNOUTEcwZMtVAHvTpxEIE6wVWd2T0U5bXF:D4CY8xZfywNPQ1ZK2pCIUwdTU5Z
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
redline
V3Cryptex
194.36.177.60:81
-
auth_value
574bd465901175470b08af8d1a301beb
Targets
-
-
Target
tmp
-
Size
163KB
-
MD5
af477d25b88a0059ec73f7f595437162
-
SHA1
7b13ff0f521763da35e136b910418f13d0b0fb88
-
SHA256
fae6e271a14675614d3d808555963b31b8e03bad2400f87f2cd2767628b077e5
-
SHA512
304ae1af571f3f442b3945969476de810aec38e36affa87577ede7746704f13ae4bee0a870bed9ec1d055b7b34d4879af154eae6ebd9b127a545fea12c809624
-
SSDEEP
3072:bvhwm6lzJUY8k2yIBZf32NwNOUTEcwZMtVAHvTpxEIE6wVWd2T0U5bXF:D4CY8xZfywNPQ1ZK2pCIUwdTU5Z
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
YTStealer payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-