General
-
Target
version_v317.exe
-
Size
1.2MB
-
Sample
220911-ay3xhaagg4
-
MD5
269d8d3d39696517d5c51948a2899be3
-
SHA1
331a42d387df9b5e6156f70ad79f267d04b34b37
-
SHA256
8fcb9763b4d3082c9965fde1d5ab7897ecac32ab0e69b871a773f4c807463f91
-
SHA512
7acee556118e38d8ff242298b542ab8fb2c2b30764ee7cc313bc75c05166a3bfd6dd403a2d520ea109cf5c56f60182a764e8bf56b7b76652c125b7090fb1f300
-
SSDEEP
24576:WcLtWeOjdpB3qHYYiYNWYaQ7oMLsd/q4z+fsCPQ9MD:WcLtWJjdp1qohcs8lD
Static task
static1
Behavioral task
behavioral1
Sample
version_v317.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
version_v317.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
redline
62.204.41.141:24758
-
auth_value
773835e0fe3917b4910de7ea8d3efab5
Targets
-
-
Target
version_v317.exe
-
Size
1.2MB
-
MD5
269d8d3d39696517d5c51948a2899be3
-
SHA1
331a42d387df9b5e6156f70ad79f267d04b34b37
-
SHA256
8fcb9763b4d3082c9965fde1d5ab7897ecac32ab0e69b871a773f4c807463f91
-
SHA512
7acee556118e38d8ff242298b542ab8fb2c2b30764ee7cc313bc75c05166a3bfd6dd403a2d520ea109cf5c56f60182a764e8bf56b7b76652c125b7090fb1f300
-
SSDEEP
24576:WcLtWeOjdpB3qHYYiYNWYaQ7oMLsd/q4z+fsCPQ9MD:WcLtWJjdp1qohcs8lD
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
YTStealer payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-