General
-
Target
0d154b0c19a489e7dffbf6683f0c691ec52c6c57ceacc6fe716f124d54091504
-
Size
1.7MB
-
Sample
211204-wfhdqsbddq
-
MD5
d26d44e3fcafbda2412ab16ad267d7e0
-
SHA1
ab1e7a00000bb5fd37c1c812ba68e9a661912f1b
-
SHA256
0d154b0c19a489e7dffbf6683f0c691ec52c6c57ceacc6fe716f124d54091504
-
SHA512
6f98b8eb5b1e708b7a4623cfb54c8243f4d8c941d2c66a838395e7bde8ee082e0458649128ee0b4e7cdb0eb3b03e5868b6b6579dbb370b43aaaa5bd6bda27b80
Static task
static1
Malware Config
Targets
-
-
Target
0d154b0c19a489e7dffbf6683f0c691ec52c6c57ceacc6fe716f124d54091504
-
Size
1.7MB
-
MD5
d26d44e3fcafbda2412ab16ad267d7e0
-
SHA1
ab1e7a00000bb5fd37c1c812ba68e9a661912f1b
-
SHA256
0d154b0c19a489e7dffbf6683f0c691ec52c6c57ceacc6fe716f124d54091504
-
SHA512
6f98b8eb5b1e708b7a4623cfb54c8243f4d8c941d2c66a838395e7bde8ee082e0458649128ee0b4e7cdb0eb3b03e5868b6b6579dbb370b43aaaa5bd6bda27b80
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-