General
-
Target
KRAKEN.exe
-
Size
13.8MB
-
Sample
220112-lq333scah9
-
MD5
b00dc98331daf06c9fdd3ac0eb5ca802
-
SHA1
1fdeb7ea4527b902e43cdac7cf733865513e570e
-
SHA256
00caa54a646237cf00f305613cdd9e0e8dd8e4dcd9706bbdfc71e22f6e673683
-
SHA512
3c2a66f20da63045ab163a1d28a4311f2ec17c7545914983f05948a4c5c5e920166fa748796b6b2d427bdeaceced641417357d906ed857a238d5c1e23ac6c5f6
Static task
static1
Behavioral task
behavioral1
Sample
KRAKEN.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
KRAKEN.exe
Resource
win10-en-20211208
Malware Config
Targets
-
-
Target
KRAKEN.exe
-
Size
13.8MB
-
MD5
b00dc98331daf06c9fdd3ac0eb5ca802
-
SHA1
1fdeb7ea4527b902e43cdac7cf733865513e570e
-
SHA256
00caa54a646237cf00f305613cdd9e0e8dd8e4dcd9706bbdfc71e22f6e673683
-
SHA512
3c2a66f20da63045ab163a1d28a4311f2ec17c7545914983f05948a4c5c5e920166fa748796b6b2d427bdeaceced641417357d906ed857a238d5c1e23ac6c5f6
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-