General
-
Target
TI.exe
-
Size
2.5MB
-
Sample
210223-rygq85tfya
-
MD5
a5d3fdf55abb54ec0b632dee9d3459d4
-
SHA1
c177421eb77f0d341e5d1bd6cfbccb60e0c86a1c
-
SHA256
677618666eb31c80e9dbecb17907676d2da2a39d24f7c20785ef577239ef5e6f
-
SHA512
4faafc484d66545a3355ba4d76da6dd021b556a06ec5b15fa8b4b8a4f1161b44ffad5e654991cf658fc6bd49b458e59586155dfdf339e1150b278ff5b9a41324
Static task
static1
Behavioral task
behavioral1
Sample
TI.exe
Resource
win7v20201028
Malware Config
Targets
-
-
Target
TI.exe
-
Size
2.5MB
-
MD5
a5d3fdf55abb54ec0b632dee9d3459d4
-
SHA1
c177421eb77f0d341e5d1bd6cfbccb60e0c86a1c
-
SHA256
677618666eb31c80e9dbecb17907676d2da2a39d24f7c20785ef577239ef5e6f
-
SHA512
4faafc484d66545a3355ba4d76da6dd021b556a06ec5b15fa8b4b8a4f1161b44ffad5e654991cf658fc6bd49b458e59586155dfdf339e1150b278ff5b9a41324
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
XMRig Miner Payload
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Loads dropped DLL
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-