General

  • Target

    Installer.exe

  • Size

    484KB

  • Sample

    220901-r2xnbsfabr

  • MD5

    03cdd6991df7a2498cb90fa4de87971f

  • SHA1

    1aaad6f995efaf38901c85d5da15f9f2376c9832

  • SHA256

    5b1631e62695df1c79327fed96c727cd96b36efa361684e4904b33511270b448

  • SHA512

    a894ec1c172ff2c7ba64bfdd4ade0b7ab681c102bf11a73d3dfe4fcefd458d69b0982f22530a3617dfd1c71a442aa61e160bfb38c5358030684de88746feaa76

  • SSDEEP

    6144:+ordzu35yDrfG6ZyRO53lRye6Vq990OdHg31nE1pp0I6zgGmr3jidUMAOvVXc:Xdzu3CjGu6Vq99Y9fGZMBpc

Malware Config

Extracted

Family

redline

C2

62.204.41.141:24758

Attributes
  • auth_value

    7f9e6cf941b1bf2200810271959a3881

Targets

    • Target

      Installer.exe

    • Size

      484KB

    • MD5

      03cdd6991df7a2498cb90fa4de87971f

    • SHA1

      1aaad6f995efaf38901c85d5da15f9f2376c9832

    • SHA256

      5b1631e62695df1c79327fed96c727cd96b36efa361684e4904b33511270b448

    • SHA512

      a894ec1c172ff2c7ba64bfdd4ade0b7ab681c102bf11a73d3dfe4fcefd458d69b0982f22530a3617dfd1c71a442aa61e160bfb38c5358030684de88746feaa76

    • SSDEEP

      6144:+ordzu35yDrfG6ZyRO53lRye6Vq990OdHg31nE1pp0I6zgGmr3jidUMAOvVXc:Xdzu3CjGu6Vq99Y9fGZMBpc

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Tasks