General
-
Target
Setup.exe
-
Size
9.8MB
-
Sample
221202-y7py1abc76
-
MD5
1f916244921ac659394380d2de6a7ae9
-
SHA1
7e2073fe760394b6105e20fcd159aba819e48d80
-
SHA256
a8c77385ffdc2415e9d142ca63d5a264e01a33e8945b1af72b828ca1f537e107
-
SHA512
e12743e6c8fac20c3c4e62e12cc6a65757efcbff8881b4dfbaef0f9694169229e3352213bff11938756ebe00e10064649311f34577b08ec685b5a9fdb0f382c1
-
SSDEEP
98304:OTjLkigLATnhWgxDdorGd2iqSBEMKUX0eUsvJHEtPsC8ezht:YVgLynhWWDdY02iqSK1UkhUJYEC8Kt
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20220812-en
Malware Config
Targets
-
-
Target
Setup.exe
-
Size
9.8MB
-
MD5
1f916244921ac659394380d2de6a7ae9
-
SHA1
7e2073fe760394b6105e20fcd159aba819e48d80
-
SHA256
a8c77385ffdc2415e9d142ca63d5a264e01a33e8945b1af72b828ca1f537e107
-
SHA512
e12743e6c8fac20c3c4e62e12cc6a65757efcbff8881b4dfbaef0f9694169229e3352213bff11938756ebe00e10064649311f34577b08ec685b5a9fdb0f382c1
-
SSDEEP
98304:OTjLkigLATnhWgxDdorGd2iqSBEMKUX0eUsvJHEtPsC8ezht:YVgLynhWWDdY02iqSK1UkhUJYEC8Kt
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-