General
-
Target
ee753d0d6e89d5ffd5bfc6f99d29d80cc4d0d3d2733b28177e844bfb2c4d2077
-
Size
3.1MB
-
Sample
220215-fk92jsbaa4
-
MD5
fd5c9f9210f7e826267d67d5d9d3565d
-
SHA1
9f93b2bd2b00c09c39bf0a64ced090b695b13d88
-
SHA256
ee753d0d6e89d5ffd5bfc6f99d29d80cc4d0d3d2733b28177e844bfb2c4d2077
-
SHA512
97f5efa198e4ad007f9026a1b40025787e6bf421d3f217cee46c9c2b06bdfc00e4d64f35b2069e3041ae0adaf8898d406e8d4f1d83e598883e013896665b31e0
Static task
static1
Behavioral task
behavioral1
Sample
ee753d0d6e89d5ffd5bfc6f99d29d80cc4d0d3d2733b28177e844bfb2c4d2077.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
ee753d0d6e89d5ffd5bfc6f99d29d80cc4d0d3d2733b28177e844bfb2c4d2077.exe
Resource
win10v2004-en-20220113
Malware Config
Targets
-
-
Target
ee753d0d6e89d5ffd5bfc6f99d29d80cc4d0d3d2733b28177e844bfb2c4d2077
-
Size
3.1MB
-
MD5
fd5c9f9210f7e826267d67d5d9d3565d
-
SHA1
9f93b2bd2b00c09c39bf0a64ced090b695b13d88
-
SHA256
ee753d0d6e89d5ffd5bfc6f99d29d80cc4d0d3d2733b28177e844bfb2c4d2077
-
SHA512
97f5efa198e4ad007f9026a1b40025787e6bf421d3f217cee46c9c2b06bdfc00e4d64f35b2069e3041ae0adaf8898d406e8d4f1d83e598883e013896665b31e0
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-