General
-
Target
b5f2049cce55c465bb3c4ed1ea424960
-
Size
3.3MB
-
Sample
240305-3l8w7sdg55
-
MD5
b5f2049cce55c465bb3c4ed1ea424960
-
SHA1
99ad1dbf6ba2806fb73a3b48b2fc6544aa8510ef
-
SHA256
3fb5d581908006ebf02c95e6811711a4c3fe211ec9e7ba029003894a60082e48
-
SHA512
aa2c5dcb0c99e139815b3dab18630a754cb6ca79009d5055bf251885af22fa5311ce1598e9c2f7eba84d97682df04590a65437f02959f8058f940c89eb9d0a64
-
SSDEEP
98304:45eezchKvrp1oBwwRjv50iry21hYJqdGxHprjbXAi3Lyrofv:ASAp1i9RjvHV1hMqd2HpF3fv
Behavioral task
behavioral1
Sample
b5f2049cce55c465bb3c4ed1ea424960.exe
Resource
win7-20240221-en
Malware Config
Extracted
redline
@SabayNigger
185.241.54.128:47729
Targets
-
-
Target
b5f2049cce55c465bb3c4ed1ea424960
-
Size
3.3MB
-
MD5
b5f2049cce55c465bb3c4ed1ea424960
-
SHA1
99ad1dbf6ba2806fb73a3b48b2fc6544aa8510ef
-
SHA256
3fb5d581908006ebf02c95e6811711a4c3fe211ec9e7ba029003894a60082e48
-
SHA512
aa2c5dcb0c99e139815b3dab18630a754cb6ca79009d5055bf251885af22fa5311ce1598e9c2f7eba84d97682df04590a65437f02959f8058f940c89eb9d0a64
-
SSDEEP
98304:45eezchKvrp1oBwwRjv50iry21hYJqdGxHprjbXAi3Lyrofv:ASAp1i9RjvHV1hMqd2HpF3fv
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-