General
-
Target
254a01201348193e84d5c4962393ad1350bf926853d035afabdb17e7e728a6a9
-
Size
4.0MB
-
Sample
220520-1gjqeahagm
-
MD5
8adcb0f839eafc44fb2089457e6bbe8a
-
SHA1
5b6ae8c5dd9e6ec6aa38dcdb32bfbbca8d0b53c9
-
SHA256
254a01201348193e84d5c4962393ad1350bf926853d035afabdb17e7e728a6a9
-
SHA512
18373ded0cf20d95ed1fa1c79c810c4370f1a811eab21a11c0a6e0a78de56fd06dc5c0663f1db44b9e612efda0ca921934ed7eba96b0eb26f1e0ceb652705b6b
Static task
static1
Behavioral task
behavioral1
Sample
254a01201348193e84d5c4962393ad1350bf926853d035afabdb17e7e728a6a9.exe
Resource
win7-20220414-en
Malware Config
Targets
-
-
Target
254a01201348193e84d5c4962393ad1350bf926853d035afabdb17e7e728a6a9
-
Size
4.0MB
-
MD5
8adcb0f839eafc44fb2089457e6bbe8a
-
SHA1
5b6ae8c5dd9e6ec6aa38dcdb32bfbbca8d0b53c9
-
SHA256
254a01201348193e84d5c4962393ad1350bf926853d035afabdb17e7e728a6a9
-
SHA512
18373ded0cf20d95ed1fa1c79c810c4370f1a811eab21a11c0a6e0a78de56fd06dc5c0663f1db44b9e612efda0ca921934ed7eba96b0eb26f1e0ceb652705b6b
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-