General
-
Target
SYNAPSE_X_CRACKED.rar
-
Size
4.5MB
-
Sample
220826-ycff3shgb3
-
MD5
06c53377fc35c61d74f7a05afabf0558
-
SHA1
823da3b7dcc9d4221012102af0c006d616745d67
-
SHA256
47a5d4fee227db598a8eb2ee7b4aa3f5ed3ecc7c6d59e2e2998a2b696854af55
-
SHA512
666f4b8f6b58ee834bb73468d7a5be13a10682bc5d950f73a7852c5a9928e175b941503c8e356071d2b2b5f833c2eab48e55061f5187de06fa713efa80163ca3
-
SSDEEP
98304:SX/EjfagrmF6hJdz6XqVHy1E+PF2dK+OS+PU5/6dRaJuKY:4S7yF6AXcy1p89+PmpnY
Static task
static1
Malware Config
Extracted
redline
185.200.191.18:80
-
auth_value
81be690af280fd9c9e7c951600742654
Targets
-
-
Target
SYNAPSE X CRACKED/SYNAPSE X CRACKED/RobloxSynapse.exe
-
Size
700.0MB
-
MD5
99709192d1df7d5f7d8e583472818007
-
SHA1
2914457c90f0a89c1ccbbdd96157907214e4b1fb
-
SHA256
e6120b4444738b23157d1476615c68a719cb22017e3e48ee794003d162a4ed20
-
SHA512
a416d828c81726a0842f85410c4bc3e0d516671c2284a30c82dc68fbe9375fab7d23cca6efcb4cd4077af910ae3843fe0b08ad31b0a87e0e6c9753fb1903257b
-
SSDEEP
49152:C7G9SRPCkd/OJLDPXissDMRT6FacYKfQWNpGW78O+siqTDpQ:C7G0Nt42DCT6HYKSZqTG
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
YTStealer payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-