Static task
static1
Behavioral task
behavioral1
Sample
d408a6a1_extracted.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
d408a6a1_extracted.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
d408a6a1_extracted
-
Size
150KB
-
MD5
ab37b2049e98c636ac5beaddae4da748
-
SHA1
ef849289e463c0b9474646e5f3e5012f86efe57f
-
SHA256
3d649dfd896254e08e979f74e73dd4d9d46c14c49c10f7682d333a7f7edda072
-
SHA512
25a3e6f99bc8a6cc03b69847af30f846f8a12acfae6207e6405b68d2ea1e386f5400f38814ac8e0f239b7591a2f2196b1670fbcd9482e3ca8debc09942cd15ff
Score
10/10
Malware Config
Signatures
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule sample family_redline -
Redline family
Files
-
d408a6a1_extracted.exe windows x86