General
-
Target
SecuriteInfo.com.Spyware.RedLineStealer.28182.28176
-
Size
217KB
-
Sample
211202-qadwgagfbq
-
MD5
015ed94ce4a51b250d7022a6ee042db1
-
SHA1
749b794ca8eb67f7b688712d9d3f7e74001a8d3d
-
SHA256
11b7d2de5330eded7451a4fb417b91ecad2c7d6a9aea7fee632facaf038e8750
-
SHA512
80740104f9b6e1e6d00a7d05bc7f2666695fd1965b28c9c24e83dd34d16084adf1dc21182b6bb14623d6ac735c047d1259d933aa7c4cca31a956d06fe3cb14ff
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Spyware.RedLineStealer.28182.28176.exe
Resource
win7-en-20211104
Malware Config
Targets
-
-
Target
SecuriteInfo.com.Spyware.RedLineStealer.28182.28176
-
Size
217KB
-
MD5
015ed94ce4a51b250d7022a6ee042db1
-
SHA1
749b794ca8eb67f7b688712d9d3f7e74001a8d3d
-
SHA256
11b7d2de5330eded7451a4fb417b91ecad2c7d6a9aea7fee632facaf038e8750
-
SHA512
80740104f9b6e1e6d00a7d05bc7f2666695fd1965b28c9c24e83dd34d16084adf1dc21182b6bb14623d6ac735c047d1259d933aa7c4cca31a956d06fe3cb14ff
-
suricata: ET MALWARE CerberTear Ransomware CnC Checkin
suricata: ET MALWARE CerberTear Ransomware CnC Checkin
-
LoaderBot executable
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-