General
-
Target
исходник.exe
-
Size
2.6MB
-
Sample
220127-vd64msgafn
-
MD5
cb267c252a42ed8e1de90463e2ab4013
-
SHA1
fcfc74cfc893c4b454cfcc190a51fc9e9b6b265b
-
SHA256
1ec0a7cf579b43db873c885bb6fcee2e082ef92fe423372acec2cab9bd9040c0
-
SHA512
ece505a79a2e2b84b731ece8024e37f4da579f6af1555ad6ae2088c5fe4c5884819e64a4ca7b42fcee464912179e88a9782566cf5f2ff18f9bf63121e5045b01
Static task
static1
Behavioral task
behavioral1
Sample
исходник.exe
Resource
win7-en-20211208
Malware Config
Extracted
redline
sapphire
185.230.143.237:2548
Targets
-
-
Target
исходник.exe
-
Size
2.6MB
-
MD5
cb267c252a42ed8e1de90463e2ab4013
-
SHA1
fcfc74cfc893c4b454cfcc190a51fc9e9b6b265b
-
SHA256
1ec0a7cf579b43db873c885bb6fcee2e082ef92fe423372acec2cab9bd9040c0
-
SHA512
ece505a79a2e2b84b731ece8024e37f4da579f6af1555ad6ae2088c5fe4c5884819e64a4ca7b42fcee464912179e88a9782566cf5f2ff18f9bf63121e5045b01
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers
suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers
-
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-