General
-
Target
FakeNordVPN_small.exe
-
Size
511KB
-
Sample
201211-1pg39zk1re
-
MD5
49525eb68b10c8c3384f7ab078cc0dfa
-
SHA1
fe5629684c1a429f7944696800ceaf8135b8568b
-
SHA256
e9c754037d5a8041b7ae49d0fe58ccf05c1369b7d801d53fb7a6d4d24002df27
-
SHA512
82f63c7db8dc7bd14461aa276f2bca6c7ee62c57f9a4adef0380ce31778138a6444da7f8e5b13d8a2dff8f4de97d2e06ab6a7f3c7c58649bb8a72ca191923e4e
Static task
static1
Behavioral task
behavioral1
Sample
FakeNordVPN_small.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
FakeNordVPN_small.exe
Resource
win10v20201028
Malware Config
Targets
-
-
Target
FakeNordVPN_small.exe
-
Size
511KB
-
MD5
49525eb68b10c8c3384f7ab078cc0dfa
-
SHA1
fe5629684c1a429f7944696800ceaf8135b8568b
-
SHA256
e9c754037d5a8041b7ae49d0fe58ccf05c1369b7d801d53fb7a6d4d24002df27
-
SHA512
82f63c7db8dc7bd14461aa276f2bca6c7ee62c57f9a4adef0380ce31778138a6444da7f8e5b13d8a2dff8f4de97d2e06ab6a7f3c7c58649bb8a72ca191923e4e
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Suspicious use of SetThreadContext
-