General
-
Target
14d9e9e29951389651ada7196394637d.exe
-
Size
18KB
-
Sample
201215-fspz4zpcks
-
MD5
14d9e9e29951389651ada7196394637d
-
SHA1
50163e90ff9d1921ca5a5097634f25124a6b50fb
-
SHA256
2b14c418ece19eda5bffd6234b71eb9b60eb9f07c80a3850fb7371fed92ad63f
-
SHA512
a181003d761574d40155ee39bf355c41a39ef6033eb91d5ca8f78569e37f2204a7ee79fbcf50027325297f5f59b0ee49bef70bbd7157a32aa38ca0f92e540915
Static task
static1
Behavioral task
behavioral1
Sample
14d9e9e29951389651ada7196394637d.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
14d9e9e29951389651ada7196394637d.exe
Resource
win10v20201028
Malware Config
Targets
-
-
Target
14d9e9e29951389651ada7196394637d.exe
-
Size
18KB
-
MD5
14d9e9e29951389651ada7196394637d
-
SHA1
50163e90ff9d1921ca5a5097634f25124a6b50fb
-
SHA256
2b14c418ece19eda5bffd6234b71eb9b60eb9f07c80a3850fb7371fed92ad63f
-
SHA512
a181003d761574d40155ee39bf355c41a39ef6033eb91d5ca8f78569e37f2204a7ee79fbcf50027325297f5f59b0ee49bef70bbd7157a32aa38ca0f92e540915
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-