General
-
Target
2e31bb2a664c08df661b6af6905a6702.exe
-
Size
19KB
-
Sample
200709-vg81lzdl6s
-
MD5
2e31bb2a664c08df661b6af6905a6702
-
SHA1
b48122cace403170b55457105cb0c43fac68ead2
-
SHA256
cfac75f3ee6ba6f7816e73908f679a7c185b12044580c1f6b0cbf41dfe74b0f7
-
SHA512
888bf0e7e2505f6f866dd2925d0740e8760308296e41888bf2d63240b7aabadb1621b845b8a6530ed6c727eb79a59b72eeab30d2eef1bb69aef1a4ced1e9000a
Static task
static1
Behavioral task
behavioral1
Sample
2e31bb2a664c08df661b6af6905a6702.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
2e31bb2a664c08df661b6af6905a6702.exe
Resource
win10
Malware Config
Targets
-
-
Target
2e31bb2a664c08df661b6af6905a6702.exe
-
Size
19KB
-
MD5
2e31bb2a664c08df661b6af6905a6702
-
SHA1
b48122cace403170b55457105cb0c43fac68ead2
-
SHA256
cfac75f3ee6ba6f7816e73908f679a7c185b12044580c1f6b0cbf41dfe74b0f7
-
SHA512
888bf0e7e2505f6f866dd2925d0740e8760308296e41888bf2d63240b7aabadb1621b845b8a6530ed6c727eb79a59b72eeab30d2eef1bb69aef1a4ced1e9000a
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks for installed software on the system
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-