General
-
Target
9cf85e1e2de960124dd87efe8dd0e72a.exe
-
Size
595KB
-
Sample
201228-nqh2smzf2s
-
MD5
9cf85e1e2de960124dd87efe8dd0e72a
-
SHA1
ea2d4379e3042fb6bd4271b35faf71c6c720f4ff
-
SHA256
0ecd4a0cbb6f891a4f527d9df3a12fc717c946556922e3ab49ad866fcd26a15a
-
SHA512
bc6a368fef8c1d5d90ba83f51cede7553d703d4b80a6aa82592c8385c2f7392f2c28ab3cd3afc69d96b86e2ff736f2f8a4607fb7128f87013d6501252b7d3a57
Static task
static1
Behavioral task
behavioral1
Sample
9cf85e1e2de960124dd87efe8dd0e72a.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
9cf85e1e2de960124dd87efe8dd0e72a.exe
Resource
win10v20201028
Malware Config
Targets
-
-
Target
9cf85e1e2de960124dd87efe8dd0e72a.exe
-
Size
595KB
-
MD5
9cf85e1e2de960124dd87efe8dd0e72a
-
SHA1
ea2d4379e3042fb6bd4271b35faf71c6c720f4ff
-
SHA256
0ecd4a0cbb6f891a4f527d9df3a12fc717c946556922e3ab49ad866fcd26a15a
-
SHA512
bc6a368fef8c1d5d90ba83f51cede7553d703d4b80a6aa82592c8385c2f7392f2c28ab3cd3afc69d96b86e2ff736f2f8a4607fb7128f87013d6501252b7d3a57
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-