General
-
Target
a410935df72f79ea065d92b0036b287c.exe
-
Size
4.5MB
-
Sample
220414-slqqhsdbeq
-
MD5
a410935df72f79ea065d92b0036b287c
-
SHA1
28465a4ab42d116fe260e103557b60dca92e02ce
-
SHA256
98fea55f7585644b6f43651491e22f91fd57a1b99c4320c11a0f67ce7c486885
-
SHA512
359f3c9af3a2968a0be4952bc2b286db670e546ac0232a0c0ac6fe39347c485e1ac140755be5c9e45606f5a02354802b1a6699bccf6e56ad1435105471c6d03d
Static task
static1
Behavioral task
behavioral1
Sample
a410935df72f79ea065d92b0036b287c.exe
Resource
win7-20220331-en
Behavioral task
behavioral2
Sample
a410935df72f79ea065d92b0036b287c.exe
Resource
win10v2004-20220310-en
Malware Config
Extracted
redline
10
185.183.32.227:80
-
auth_value
187348b4b0ba6b71d26eaf47eb720dc2
Targets
-
-
Target
a410935df72f79ea065d92b0036b287c.exe
-
Size
4.5MB
-
MD5
a410935df72f79ea065d92b0036b287c
-
SHA1
28465a4ab42d116fe260e103557b60dca92e02ce
-
SHA256
98fea55f7585644b6f43651491e22f91fd57a1b99c4320c11a0f67ce7c486885
-
SHA512
359f3c9af3a2968a0be4952bc2b286db670e546ac0232a0c0ac6fe39347c485e1ac140755be5c9e45606f5a02354802b1a6699bccf6e56ad1435105471c6d03d
-
Meta Stealer Stealer
Meta Stealer steals passwords stored in browsers, written in C++.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-