General
-
Target
adb0723bc2ae9ac441f4889fe4983ae70b1187346ee81119af7b5bdc59415beb
-
Size
3.1MB
-
Sample
220215-hynrksdebn
-
MD5
1e6cff82ce2d682a01fa982c75f3b8f6
-
SHA1
bb963b7256c5787d1c0787624f6bd2364dbfbf55
-
SHA256
adb0723bc2ae9ac441f4889fe4983ae70b1187346ee81119af7b5bdc59415beb
-
SHA512
3708572494729bdbd8662cf447f367893cb4d6844d247c4819c530b6cf3a3407cfeaa5ae790e40081b6c7cc7fc54f1424979192dde44f29dfc525ffed54368a2
Static task
static1
Behavioral task
behavioral1
Sample
adb0723bc2ae9ac441f4889fe4983ae70b1187346ee81119af7b5bdc59415beb.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
adb0723bc2ae9ac441f4889fe4983ae70b1187346ee81119af7b5bdc59415beb.exe
Resource
win10v2004-en-20220112
Malware Config
Targets
-
-
Target
adb0723bc2ae9ac441f4889fe4983ae70b1187346ee81119af7b5bdc59415beb
-
Size
3.1MB
-
MD5
1e6cff82ce2d682a01fa982c75f3b8f6
-
SHA1
bb963b7256c5787d1c0787624f6bd2364dbfbf55
-
SHA256
adb0723bc2ae9ac441f4889fe4983ae70b1187346ee81119af7b5bdc59415beb
-
SHA512
3708572494729bdbd8662cf447f367893cb4d6844d247c4819c530b6cf3a3407cfeaa5ae790e40081b6c7cc7fc54f1424979192dde44f29dfc525ffed54368a2
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-