General
-
Target
191cfad3f68bdedbad3b6840e8d93ba5bb2566717de801264684c679340df950
-
Size
444KB
-
Sample
220126-n8rh4scedl
-
MD5
2cca70300e75df503f6676803b470383
-
SHA1
7de77087c0dd09612acb8aa97025c9aa495e64f3
-
SHA256
191cfad3f68bdedbad3b6840e8d93ba5bb2566717de801264684c679340df950
-
SHA512
a0def3aba2baaff74eb4e98e399ad053d81929a7d8a45c954cc0aacfe86c8b411cabcdc823f543859c059c53abe874ba13d3a5cb5ba56007eb619fa55c538126
Static task
static1
Behavioral task
behavioral1
Sample
191cfad3f68bdedbad3b6840e8d93ba5bb2566717de801264684c679340df950.exe
Resource
win10v2004-en-20220112
Malware Config
Targets
-
-
Target
191cfad3f68bdedbad3b6840e8d93ba5bb2566717de801264684c679340df950
-
Size
444KB
-
MD5
2cca70300e75df503f6676803b470383
-
SHA1
7de77087c0dd09612acb8aa97025c9aa495e64f3
-
SHA256
191cfad3f68bdedbad3b6840e8d93ba5bb2566717de801264684c679340df950
-
SHA512
a0def3aba2baaff74eb4e98e399ad053d81929a7d8a45c954cc0aacfe86c8b411cabcdc823f543859c059c53abe874ba13d3a5cb5ba56007eb619fa55c538126
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Sets service image path in registry
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-