General
-
Target
84a0f9d46ca77c5ae10713f844cfedbd.exe
-
Size
20KB
-
Sample
200707-mc3fwjpgga
-
MD5
84a0f9d46ca77c5ae10713f844cfedbd
-
SHA1
1e1cdc9cc03c026157bdc5dca1f9c0ee78de71aa
-
SHA256
dbbc9e640af23658de56eba2f5ec2152de38fa35f11343f0d2216b8b5d7967a8
-
SHA512
69cc6970ff185a0795257739a41864d69306468bc82cdddfec20b0239a00f562d8e0a012a7127c2bdae083da38e3700e0099b933436850e85137c5f7d1fe73ed
Static task
static1
Behavioral task
behavioral1
Sample
84a0f9d46ca77c5ae10713f844cfedbd.exe
Resource
win7v200430
Malware Config
Targets
-
-
Target
84a0f9d46ca77c5ae10713f844cfedbd.exe
-
Size
20KB
-
MD5
84a0f9d46ca77c5ae10713f844cfedbd
-
SHA1
1e1cdc9cc03c026157bdc5dca1f9c0ee78de71aa
-
SHA256
dbbc9e640af23658de56eba2f5ec2152de38fa35f11343f0d2216b8b5d7967a8
-
SHA512
69cc6970ff185a0795257739a41864d69306468bc82cdddfec20b0239a00f562d8e0a012a7127c2bdae083da38e3700e0099b933436850e85137c5f7d1fe73ed
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks for installed software on the system
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-