General
-
Target
Fake Bitcoin Transaction.exe
-
Size
593KB
-
Sample
220906-qs6n7sagel
-
MD5
8348bc8878f2d004c9e79b71a3a3e06b
-
SHA1
1f1f08004124eebf132bbf743b6b70064e3b71f9
-
SHA256
54b9b801e07066fe1769e5f9e1fac7a3271312e00b469ef52f078108d24a4f1d
-
SHA512
93509f4ba464497005922347e57133afb6a6ebf274712f01fb3857a15cb57e6744950140ebd6a554ca9afca597641fec41848b62f83686678088d067b798c543
-
SSDEEP
12288:sQLutGAXqsp8qTqL12eJM4cIwevZQhLv929ZjI9:sMusAXtpTi12eJM4hxZI9
Static task
static1
Malware Config
Extracted
redline
ubivca
185.106.92.228:24221
-
auth_value
43ba5caf87c83f17aa82312a2b9ec2de
Targets
-
-
Target
Fake Bitcoin Transaction.exe
-
Size
593KB
-
MD5
8348bc8878f2d004c9e79b71a3a3e06b
-
SHA1
1f1f08004124eebf132bbf743b6b70064e3b71f9
-
SHA256
54b9b801e07066fe1769e5f9e1fac7a3271312e00b469ef52f078108d24a4f1d
-
SHA512
93509f4ba464497005922347e57133afb6a6ebf274712f01fb3857a15cb57e6744950140ebd6a554ca9afca597641fec41848b62f83686678088d067b798c543
-
SSDEEP
12288:sQLutGAXqsp8qTqL12eJM4cIwevZQhLv929ZjI9:sMusAXtpTi12eJM4hxZI9
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
YTStealer payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-