General
-
Target
71200e09252115d52bb62c8810413bccebe56e58ba070.exe
-
Size
139KB
-
Sample
220902-ygyhfsbcdm
-
MD5
03aa45b7c20bcddac8ae49cf4ca737c8
-
SHA1
e7eea8b0987a1b9cd5703debbd016d7efed8bf0a
-
SHA256
71200e09252115d52bb62c8810413bccebe56e58ba070347c7b5d827396a6d44
-
SHA512
420c71eabbdd191c1719233a48bd4d68a73ace463ceeb600223ade9daa6f8cecf0b88a38b32286ff9f10f26a237c411d5ddce4ee8391740e2da5a5f9bb06cadd
-
SSDEEP
3072:1WUvJDDILZfE0+3tONQEyPqX94MF3zqjz5/9999999999999999999999999999Y:TDDWm3QNLX9fF3uf57k
Static task
static1
Behavioral task
behavioral1
Sample
71200e09252115d52bb62c8810413bccebe56e58ba070.exe
Resource
win7-20220901-en
Malware Config
Extracted
redline
vjames1
142.132.164.118:28463
-
auth_value
33ac351077c983bff92335a288c764e5
Targets
-
-
Target
71200e09252115d52bb62c8810413bccebe56e58ba070.exe
-
Size
139KB
-
MD5
03aa45b7c20bcddac8ae49cf4ca737c8
-
SHA1
e7eea8b0987a1b9cd5703debbd016d7efed8bf0a
-
SHA256
71200e09252115d52bb62c8810413bccebe56e58ba070347c7b5d827396a6d44
-
SHA512
420c71eabbdd191c1719233a48bd4d68a73ace463ceeb600223ade9daa6f8cecf0b88a38b32286ff9f10f26a237c411d5ddce4ee8391740e2da5a5f9bb06cadd
-
SSDEEP
3072:1WUvJDDILZfE0+3tONQEyPqX94MF3zqjz5/9999999999999999999999999999Y:TDDWm3QNLX9fF3uf57k
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
YTStealer payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-