General
-
Target
Chron.exe
-
Size
490KB
-
Sample
221019-bt375sedb6
-
MD5
f87135178fe6abd26406c9a9d026894a
-
SHA1
dfcea258c1e56097601f7a5e7fb4e4f9a6aec3eb
-
SHA256
4905ecda46a5a03e0d6c5a8144ec47063109fc2eb5fbb5e06722080e63eb7394
-
SHA512
885ec3c0a56ec5247579f85ae83d909c43264c4466dfeab24bb7d2d388f1a3f2abce0136303726384c2c91b2a398d84e8ec09c21ef81c70e74157d21f9c7b251
-
SSDEEP
6144:FLXU3QBk29LvIY28arOtXNt25Qd9lxtPoCFbfgKrcwny2BHaxK7:5U3yu9WQQT9oCFKwn7B6i
Static task
static1
Behavioral task
behavioral1
Sample
Chron.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Chron.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
redline
Crypt_Mastif_V1
194.36.177.60:81
-
auth_value
140a3d1ac14114893f898a1e7e4ba24f
Targets
-
-
Target
Chron.exe
-
Size
490KB
-
MD5
f87135178fe6abd26406c9a9d026894a
-
SHA1
dfcea258c1e56097601f7a5e7fb4e4f9a6aec3eb
-
SHA256
4905ecda46a5a03e0d6c5a8144ec47063109fc2eb5fbb5e06722080e63eb7394
-
SHA512
885ec3c0a56ec5247579f85ae83d909c43264c4466dfeab24bb7d2d388f1a3f2abce0136303726384c2c91b2a398d84e8ec09c21ef81c70e74157d21f9c7b251
-
SSDEEP
6144:FLXU3QBk29LvIY28arOtXNt25Qd9lxtPoCFbfgKrcwny2BHaxK7:5U3yu9WQQT9oCFKwn7B6i
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
YTStealer payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-