General
-
Target
ca3da0c1036027d528fa90b35bd0cb9d486591c6ab946d8aefdaf075f78a09d2
-
Size
2.4MB
-
Sample
220215-gv683sdack
-
MD5
8a07d238fff6bf229b75505fbd8fa4b1
-
SHA1
a6041f6807969f1fa811f6782adb9297b87db39d
-
SHA256
ca3da0c1036027d528fa90b35bd0cb9d486591c6ab946d8aefdaf075f78a09d2
-
SHA512
f1fa7b9a294d02b77825dc0621ca7233fa0b1f8b3a76f7d24136bdb6ade615b2b20bda261c76b3a196faa12066c77b40f8a5814f3fa93eb2beee981f7007ab71
Static task
static1
Behavioral task
behavioral1
Sample
ca3da0c1036027d528fa90b35bd0cb9d486591c6ab946d8aefdaf075f78a09d2.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
ca3da0c1036027d528fa90b35bd0cb9d486591c6ab946d8aefdaf075f78a09d2.exe
Resource
win10v2004-en-20220112
Malware Config
Targets
-
-
Target
ca3da0c1036027d528fa90b35bd0cb9d486591c6ab946d8aefdaf075f78a09d2
-
Size
2.4MB
-
MD5
8a07d238fff6bf229b75505fbd8fa4b1
-
SHA1
a6041f6807969f1fa811f6782adb9297b87db39d
-
SHA256
ca3da0c1036027d528fa90b35bd0cb9d486591c6ab946d8aefdaf075f78a09d2
-
SHA512
f1fa7b9a294d02b77825dc0621ca7233fa0b1f8b3a76f7d24136bdb6ade615b2b20bda261c76b3a196faa12066c77b40f8a5814f3fa93eb2beee981f7007ab71
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-