General
-
Target
f582a6ee6e023d421c91fdd13392965cdf850b2a0f6b262461e266193fb4785f
-
Size
3.0MB
-
Sample
220215-fcbtsaaha4
-
MD5
d23a279f4c69813fd3dacbeea8eb9c20
-
SHA1
b9e34585e8873b822790b94010f042a1696e499b
-
SHA256
f582a6ee6e023d421c91fdd13392965cdf850b2a0f6b262461e266193fb4785f
-
SHA512
c27cef263e92fd3f2dd378a66ae85322a43648d7ccaf0a812a96590fdce18902d6e11ec4fd7653e0456b8a8798edc084b6dad711c79580b84101b7a04503d274
Static task
static1
Behavioral task
behavioral1
Sample
f582a6ee6e023d421c91fdd13392965cdf850b2a0f6b262461e266193fb4785f.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
f582a6ee6e023d421c91fdd13392965cdf850b2a0f6b262461e266193fb4785f.exe
Resource
win10v2004-en-20220113
Malware Config
Targets
-
-
Target
f582a6ee6e023d421c91fdd13392965cdf850b2a0f6b262461e266193fb4785f
-
Size
3.0MB
-
MD5
d23a279f4c69813fd3dacbeea8eb9c20
-
SHA1
b9e34585e8873b822790b94010f042a1696e499b
-
SHA256
f582a6ee6e023d421c91fdd13392965cdf850b2a0f6b262461e266193fb4785f
-
SHA512
c27cef263e92fd3f2dd378a66ae85322a43648d7ccaf0a812a96590fdce18902d6e11ec4fd7653e0456b8a8798edc084b6dad711c79580b84101b7a04503d274
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-