Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
05-12-2021 08:45
Static task
static1
Behavioral task
behavioral1
Sample
d26d44e3fcafbda2412ab16ad267d7e0.exe
Resource
win7-en-20211104
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
d26d44e3fcafbda2412ab16ad267d7e0.exe
Resource
win10-en-20211104
windows10_x64
0 signatures
0 seconds
General
-
Target
d26d44e3fcafbda2412ab16ad267d7e0.exe
-
Size
1.7MB
-
MD5
d26d44e3fcafbda2412ab16ad267d7e0
-
SHA1
ab1e7a00000bb5fd37c1c812ba68e9a661912f1b
-
SHA256
0d154b0c19a489e7dffbf6683f0c691ec52c6c57ceacc6fe716f124d54091504
-
SHA512
6f98b8eb5b1e708b7a4623cfb54c8243f4d8c941d2c66a838395e7bde8ee082e0458649128ee0b4e7cdb0eb3b03e5868b6b6579dbb370b43aaaa5bd6bda27b80
Score
10/10
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
resource yara_rule behavioral1/memory/1292-104-0x0000000000400000-0x00000000007FA000-memory.dmp family_redline -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d26d44e3fcafbda2412ab16ad267d7e0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d26d44e3fcafbda2412ab16ad267d7e0.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA d26d44e3fcafbda2412ab16ad267d7e0.exe