General
-
Target
025307069088cfb359731f34f3af68db.exe
-
Size
1.9MB
-
Sample
240101-llc14affhn
-
MD5
025307069088cfb359731f34f3af68db
-
SHA1
fec66a9c9c56c05c0550cb81b0d3169a37210d5f
-
SHA256
355c9f31d4f4cf6242a8bedf18d47dbcf2cf863abbe83acd6c8beb9e89e3aad2
-
SHA512
17692dbe5dd65ffb863ec1dfbf7fd7070b389c3607dd995b38bb7ea87f45fce1d74ceaf87348aa1320bc0581ac9ebc7cf5a3bd42ee852a9751abb9dd336d2219
-
SSDEEP
49152:n0Fu06MypMVPMB0MX6l7FhDft1BVe9YIJJOHa3q47s+Uu:n04GVPM0w87LDNVe903cs+3
Static task
static1
Behavioral task
behavioral1
Sample
025307069088cfb359731f34f3af68db.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
025307069088cfb359731f34f3af68db.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
redline
54.38.123.247:8696
Targets
-
-
Target
025307069088cfb359731f34f3af68db.exe
-
Size
1.9MB
-
MD5
025307069088cfb359731f34f3af68db
-
SHA1
fec66a9c9c56c05c0550cb81b0d3169a37210d5f
-
SHA256
355c9f31d4f4cf6242a8bedf18d47dbcf2cf863abbe83acd6c8beb9e89e3aad2
-
SHA512
17692dbe5dd65ffb863ec1dfbf7fd7070b389c3607dd995b38bb7ea87f45fce1d74ceaf87348aa1320bc0581ac9ebc7cf5a3bd42ee852a9751abb9dd336d2219
-
SSDEEP
49152:n0Fu06MypMVPMB0MX6l7FhDft1BVe9YIJJOHa3q47s+Uu:n04GVPM0w87LDNVe903cs+3
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
SectopRAT payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-