Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
28-12-2020 07:49
Static task
static1
Behavioral task
behavioral1
Sample
ce62304c3eff639e1b2352667a569b8a.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
ce62304c3eff639e1b2352667a569b8a.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
ce62304c3eff639e1b2352667a569b8a.exe
-
Size
275KB
-
MD5
ce62304c3eff639e1b2352667a569b8a
-
SHA1
5a5cb774b59befe102fe04e93d9853cfbda3334b
-
SHA256
e8356fad49709d2563d2707dbb09f4f1019e30a0ff5836047a11b3d1d84f4d62
-
SHA512
99d77537f2fade1ca2255c16fcd5d64618f0364f15cddb1b6a48814c9a7e59ccdac72db7f0a1cf4b0eac63180264fd58989e43839373d085ecb42ad2b9fe6f41
Score
10/10
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/848-6-0x0000000004E80000-0x0000000004EA4000-memory.dmp family_redline behavioral1/memory/848-7-0x0000000005160000-0x0000000005182000-memory.dmp family_redline -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ce62304c3eff639e1b2352667a569b8a.exedescription pid process Token: SeDebugPrivilege 848 ce62304c3eff639e1b2352667a569b8a.exe