General
-
Target
ae4ac666d4c6073f23e078629ee01bba.exe
-
Size
400KB
-
Sample
210310-p8pk34py8n
-
MD5
ae4ac666d4c6073f23e078629ee01bba
-
SHA1
606a6e995b3754ff1494730242cf9fdf65936740
-
SHA256
5d63d1c4eb964d27d53d83b399b38ffad6609b204b8741e5626d4427cc7421af
-
SHA512
19d566f149b780dbd37aaa1ae1d72572bfb078da9f320c6fca04d0ea85b97431263104720910972d332ca94cb2801eef323388ad6a8e76c34d85336ec13426ef
Static task
static1
Behavioral task
behavioral1
Sample
ae4ac666d4c6073f23e078629ee01bba.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
ae4ac666d4c6073f23e078629ee01bba.exe
Resource
win10v20201028
Malware Config
Targets
-
-
Target
ae4ac666d4c6073f23e078629ee01bba.exe
-
Size
400KB
-
MD5
ae4ac666d4c6073f23e078629ee01bba
-
SHA1
606a6e995b3754ff1494730242cf9fdf65936740
-
SHA256
5d63d1c4eb964d27d53d83b399b38ffad6609b204b8741e5626d4427cc7421af
-
SHA512
19d566f149b780dbd37aaa1ae1d72572bfb078da9f320c6fca04d0ea85b97431263104720910972d332ca94cb2801eef323388ad6a8e76c34d85336ec13426ef
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-