Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
24-12-2020 11:40
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Variant.Bulz.280947.15103.30535.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Variant.Bulz.280947.15103.30535.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
SecuriteInfo.com.Variant.Bulz.280947.15103.30535.exe
-
Size
371KB
-
MD5
e8cf0e1662dbf0059e06baa644cfe52c
-
SHA1
8b278efbe3666da07725a7dfd512c7aa9e12379b
-
SHA256
13b4456c19c9552d5986582cb97c22888d70f93b88d4f7445ad1c126ef27f5f7
-
SHA512
5d508d4f98cf6184870e4b476638d09ddeef777e0e372a59c3e97428d54df1496640d2948538cc4243f8fd293ac0a48d14cba1ec6620a888d533fb23fdd7db02
Score
10/10
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1208-6-0x0000000006DB0000-0x0000000006DD4000-memory.dmp family_redline behavioral1/memory/1208-7-0x0000000006F00000-0x0000000006F22000-memory.dmp family_redline -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
SecuriteInfo.com.Variant.Bulz.280947.15103.30535.exedescription pid process Token: SeDebugPrivilege 1208 SecuriteInfo.com.Variant.Bulz.280947.15103.30535.exe