General
-
Target
3c55ce0720097ed56bf705f6361a660c.exe
-
Size
622KB
-
Sample
210218-kqf7j9daps
-
MD5
3c55ce0720097ed56bf705f6361a660c
-
SHA1
4702e863e6e0484f5329c0938b3b4e7c93225467
-
SHA256
42b653a004ebf20afd1797fa69fe13dc18c07281befd059d21c3f5f994b33723
-
SHA512
afe3d396d228259c5e3c761e9ce2ac506ea158deebe4be676fcf6f09047c93a9ccfe27e7e116ec10295cab6bbaaf7ff17fecbe33d44bfc2a97c14825deb61256
Static task
static1
Behavioral task
behavioral1
Sample
3c55ce0720097ed56bf705f6361a660c.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
3c55ce0720097ed56bf705f6361a660c.exe
Resource
win10v20201028
Malware Config
Targets
-
-
Target
3c55ce0720097ed56bf705f6361a660c.exe
-
Size
622KB
-
MD5
3c55ce0720097ed56bf705f6361a660c
-
SHA1
4702e863e6e0484f5329c0938b3b4e7c93225467
-
SHA256
42b653a004ebf20afd1797fa69fe13dc18c07281befd059d21c3f5f994b33723
-
SHA512
afe3d396d228259c5e3c761e9ce2ac506ea158deebe4be676fcf6f09047c93a9ccfe27e7e116ec10295cab6bbaaf7ff17fecbe33d44bfc2a97c14825deb61256
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-