General
-
Target
85ef416ea4190eaf38a2697152ee6561.exe
-
Size
3.0MB
-
Sample
210223-5eqx4w2rve
-
MD5
85ef416ea4190eaf38a2697152ee6561
-
SHA1
556d37b62d2068273f56a988e4aed4429d7c10f6
-
SHA256
f9ef65133d324e1026972cbfbbe86fb0f2a4174a864dedbb45a73857770baaad
-
SHA512
acc21ec3f786eaabfc1d296183e218c277fabac86345a02bf45da4c9c864a29193f6c591cc9902389e3301b021e064a2149171c434d1bf95cd62c125962fb4b7
Static task
static1
Behavioral task
behavioral1
Sample
85ef416ea4190eaf38a2697152ee6561.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
85ef416ea4190eaf38a2697152ee6561.exe
Resource
win10v20201028
Malware Config
Targets
-
-
Target
85ef416ea4190eaf38a2697152ee6561.exe
-
Size
3.0MB
-
MD5
85ef416ea4190eaf38a2697152ee6561
-
SHA1
556d37b62d2068273f56a988e4aed4429d7c10f6
-
SHA256
f9ef65133d324e1026972cbfbbe86fb0f2a4174a864dedbb45a73857770baaad
-
SHA512
acc21ec3f786eaabfc1d296183e218c277fabac86345a02bf45da4c9c864a29193f6c591cc9902389e3301b021e064a2149171c434d1bf95cd62c125962fb4b7
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-