General
-
Target
d01fe3dbc995e4b5b209631e5ae30b792d88a78676f695127f8a5db9bf59b48c
-
Size
3.2MB
-
Sample
240704-2p931atelp
-
MD5
e671a39ffdad8e262a45ef77d97a14f4
-
SHA1
d451ad059bf52c22ff5de8ed7968991bbc169828
-
SHA256
d01fe3dbc995e4b5b209631e5ae30b792d88a78676f695127f8a5db9bf59b48c
-
SHA512
1352b04ffd300060e9abcc2880e53c4957a2b128b006603a20a08793a57b766b6579f5c53325b3fccc57db660fb7f14b93b7259e9fd0e1f2a78c53be026f3a20
-
SSDEEP
49152:27vtm1geO0RDX0/BxBL6V2nM5PsKGPGatU8H+f7z0VBeNPswBr:27VmdOMeBvLa2nVKG+aZ20BSP3
Static task
static1
Behavioral task
behavioral1
Sample
d01fe3dbc995e4b5b209631e5ae30b792d88a78676f695127f8a5db9bf59b48c.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
d01fe3dbc995e4b5b209631e5ae30b792d88a78676f695127f8a5db9bf59b48c.exe
Resource
win10-20240404-en
Malware Config
Extracted
redline
YT&TEAM CLOUD
185.172.128.33:8970
Targets
-
-
Target
d01fe3dbc995e4b5b209631e5ae30b792d88a78676f695127f8a5db9bf59b48c
-
Size
3.2MB
-
MD5
e671a39ffdad8e262a45ef77d97a14f4
-
SHA1
d451ad059bf52c22ff5de8ed7968991bbc169828
-
SHA256
d01fe3dbc995e4b5b209631e5ae30b792d88a78676f695127f8a5db9bf59b48c
-
SHA512
1352b04ffd300060e9abcc2880e53c4957a2b128b006603a20a08793a57b766b6579f5c53325b3fccc57db660fb7f14b93b7259e9fd0e1f2a78c53be026f3a20
-
SSDEEP
49152:27vtm1geO0RDX0/BxBL6V2nM5PsKGPGatU8H+f7z0VBeNPswBr:27VmdOMeBvLa2nVKG+aZ20BSP3
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-