General
-
Target
20e704d3e137459c78beafbbc85a3a1c
-
Size
2.7MB
-
Sample
231231-aatnxsbgg9
-
MD5
20e704d3e137459c78beafbbc85a3a1c
-
SHA1
0a629b6d207ec4c80207320379369bb83b09893d
-
SHA256
ff721387c09c52da9e700f8c45a576b3bb23fd9235de81ebc5259793ac643eef
-
SHA512
04206d845852ade5bf6818d1d1bcb5612e328b7c846568fed8181b99d23ac967d89b741f97a23cc6126291320c9da657c0411e252a0b2cce7673407e739e4aaa
-
SSDEEP
49152:tVCnOFEGRdoPciiJZFLEl4tnrh6GcbxwDaABntrHBKDyCh/pPZSiS7DXj5V:tVcOffmcitqr/cbxunt8DyCh/pPODXn
Behavioral task
behavioral1
Sample
20e704d3e137459c78beafbbc85a3a1c.exe
Resource
win7-20231129-en
Malware Config
Extracted
redline
1108(3)
46.28.204.54:27605
Targets
-
-
Target
20e704d3e137459c78beafbbc85a3a1c
-
Size
2.7MB
-
MD5
20e704d3e137459c78beafbbc85a3a1c
-
SHA1
0a629b6d207ec4c80207320379369bb83b09893d
-
SHA256
ff721387c09c52da9e700f8c45a576b3bb23fd9235de81ebc5259793ac643eef
-
SHA512
04206d845852ade5bf6818d1d1bcb5612e328b7c846568fed8181b99d23ac967d89b741f97a23cc6126291320c9da657c0411e252a0b2cce7673407e739e4aaa
-
SSDEEP
49152:tVCnOFEGRdoPciiJZFLEl4tnrh6GcbxwDaABntrHBKDyCh/pPZSiS7DXj5V:tVcOffmcitqr/cbxunt8DyCh/pPODXn
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-