General
-
Target
be42138c007747b94d01e4b2b1698498.exe
-
Size
1.4MB
-
Sample
201102-e1gsd3lak2
-
MD5
be42138c007747b94d01e4b2b1698498
-
SHA1
67261c10902204f1aab2ae88d89325e705c76329
-
SHA256
b4c89616a5a88bf22085f8f4322ad8935265dc5d34248bb1332dbc1d4537c9e8
-
SHA512
c1e33805c33ac0889197fe5fd7eadbe037487bddd7cec5f30c4dc85d3ec1368fa4404cfb3c2afcf5d5d3638ac852c5c1b41b6537005405a052a893746007ae39
Static task
static1
Behavioral task
behavioral1
Sample
be42138c007747b94d01e4b2b1698498.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
be42138c007747b94d01e4b2b1698498.exe
Resource
win10v20201028
Malware Config
Targets
-
-
Target
be42138c007747b94d01e4b2b1698498.exe
-
Size
1.4MB
-
MD5
be42138c007747b94d01e4b2b1698498
-
SHA1
67261c10902204f1aab2ae88d89325e705c76329
-
SHA256
b4c89616a5a88bf22085f8f4322ad8935265dc5d34248bb1332dbc1d4537c9e8
-
SHA512
c1e33805c33ac0889197fe5fd7eadbe037487bddd7cec5f30c4dc85d3ec1368fa4404cfb3c2afcf5d5d3638ac852c5c1b41b6537005405a052a893746007ae39
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Deletes itself
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-