General
-
Target
de5b69163b3ee3da6e6b852e857bc7c4.exe
-
Size
773KB
-
Sample
201101-hz553q49t2
-
MD5
de5b69163b3ee3da6e6b852e857bc7c4
-
SHA1
cad75eb4beb9e3f5157df853cb023d8ebacd2b1e
-
SHA256
07f0f8308cf0da73ba917e592bc6b746fba3078b2ac25a98760f4fc30952d869
-
SHA512
e2f6d43cd0bd236223023d718bf5a61505c7fa6f0e6199c04dd232c28ef115ec7cc32f73a1279e3ebed6b1a8ade967600f6d315a23bc41e665c5ab5b25fedc47
Static task
static1
Behavioral task
behavioral1
Sample
de5b69163b3ee3da6e6b852e857bc7c4.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
de5b69163b3ee3da6e6b852e857bc7c4.exe
Resource
win10v20201028
Malware Config
Targets
-
-
Target
de5b69163b3ee3da6e6b852e857bc7c4.exe
-
Size
773KB
-
MD5
de5b69163b3ee3da6e6b852e857bc7c4
-
SHA1
cad75eb4beb9e3f5157df853cb023d8ebacd2b1e
-
SHA256
07f0f8308cf0da73ba917e592bc6b746fba3078b2ac25a98760f4fc30952d869
-
SHA512
e2f6d43cd0bd236223023d718bf5a61505c7fa6f0e6199c04dd232c28ef115ec7cc32f73a1279e3ebed6b1a8ade967600f6d315a23bc41e665c5ab5b25fedc47
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-