General
-
Target
d0fb8f0c2ad138a8b8e5c9dc346089bd3216a5758ef23c448ae7abaf44ca99a1
-
Size
3.1MB
-
Sample
220215-gl2bgabeb3
-
MD5
7b57c3d62f74a9f9074be9595376943c
-
SHA1
22e2301b1531e328d7e41a9c241c340bf8af5738
-
SHA256
d0fb8f0c2ad138a8b8e5c9dc346089bd3216a5758ef23c448ae7abaf44ca99a1
-
SHA512
050b9deb88280d42bf8b49ea6db4de3c634fd4f200b081668f2d53576440a6cb5bbdb95364c07bd2b4757103e5bd83c32addc29b629e345c53d98600f7b9e85e
Static task
static1
Behavioral task
behavioral1
Sample
d0fb8f0c2ad138a8b8e5c9dc346089bd3216a5758ef23c448ae7abaf44ca99a1.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
d0fb8f0c2ad138a8b8e5c9dc346089bd3216a5758ef23c448ae7abaf44ca99a1.exe
Resource
win10v2004-en-20220112
Malware Config
Targets
-
-
Target
d0fb8f0c2ad138a8b8e5c9dc346089bd3216a5758ef23c448ae7abaf44ca99a1
-
Size
3.1MB
-
MD5
7b57c3d62f74a9f9074be9595376943c
-
SHA1
22e2301b1531e328d7e41a9c241c340bf8af5738
-
SHA256
d0fb8f0c2ad138a8b8e5c9dc346089bd3216a5758ef23c448ae7abaf44ca99a1
-
SHA512
050b9deb88280d42bf8b49ea6db4de3c634fd4f200b081668f2d53576440a6cb5bbdb95364c07bd2b4757103e5bd83c32addc29b629e345c53d98600f7b9e85e
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-