General
-
Target
f0dbbe935cec210dac60dce37999c540573cbe6da411e742e5f30dc3beb5a532
-
Size
467KB
-
Sample
220824-2zrpeacbhj
-
MD5
a631cd1c9b9335eee6aa5e39223e6c85
-
SHA1
6d7b9b109deeec214c0aee463280fb385d0ba6b4
-
SHA256
f0dbbe935cec210dac60dce37999c540573cbe6da411e742e5f30dc3beb5a532
-
SHA512
5d8e4a5c837dbe88912f2036b679df3411099e52fce7e095d2e35738a4d9f1c32d5ffa7925f8348a8c4ddc55ef583a196f1ea13add131f19d0c1fa762be38f1c
-
SSDEEP
12288:cU8tvvt1OS0tAbvHL7wWZwCeqzcMQV0pFY:cFWALrsLC3zRLY
Static task
static1
Behavioral task
behavioral1
Sample
f0dbbe935cec210dac60dce37999c540573cbe6da411e742e5f30dc3beb5a532.exe
Resource
win7-20220812-en
Malware Config
Extracted
redline
a3
65.21.133.231:47430
-
auth_value
6171b64699d91ea058ba94185cb8acbb
Targets
-
-
Target
f0dbbe935cec210dac60dce37999c540573cbe6da411e742e5f30dc3beb5a532
-
Size
467KB
-
MD5
a631cd1c9b9335eee6aa5e39223e6c85
-
SHA1
6d7b9b109deeec214c0aee463280fb385d0ba6b4
-
SHA256
f0dbbe935cec210dac60dce37999c540573cbe6da411e742e5f30dc3beb5a532
-
SHA512
5d8e4a5c837dbe88912f2036b679df3411099e52fce7e095d2e35738a4d9f1c32d5ffa7925f8348a8c4ddc55ef583a196f1ea13add131f19d0c1fa762be38f1c
-
SSDEEP
12288:cU8tvvt1OS0tAbvHL7wWZwCeqzcMQV0pFY:cFWALrsLC3zRLY
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
YTStealer payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-