General
-
Target
9918daecd7bf9c87e285d506568ea7ccef81c7670eab4266fb7ca01576989178.exe
-
Size
3.0MB
-
Sample
241123-zpb5vsslcm
-
MD5
adb44b6260f073b1301b7c528ecce1b2
-
SHA1
90f84e324cfaa70a2f053726e5f366303ba26a98
-
SHA256
9918daecd7bf9c87e285d506568ea7ccef81c7670eab4266fb7ca01576989178
-
SHA512
e14c10158bca545e181b16cc5146324dfeeebe2c6431449779000c10f7002e4da91f0f84029e6f5d3534769c7fbc26c3c6dcd152233a692850a84f6f3ad07370
-
SSDEEP
49152:oONykdwTu98f1sO2xtqkvRId4vP2DRYlpPncdugvXtO9zUqu6ZJtc+wTrjBDkiQL:B/wqGaxZRlWRYlpovvXMzBLZJtc7Trlg
Behavioral task
behavioral1
Sample
9918daecd7bf9c87e285d506568ea7ccef81c7670eab4266fb7ca01576989178.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
9918daecd7bf9c87e285d506568ea7ccef81c7670eab4266fb7ca01576989178.exe
-
Size
3.0MB
-
MD5
adb44b6260f073b1301b7c528ecce1b2
-
SHA1
90f84e324cfaa70a2f053726e5f366303ba26a98
-
SHA256
9918daecd7bf9c87e285d506568ea7ccef81c7670eab4266fb7ca01576989178
-
SHA512
e14c10158bca545e181b16cc5146324dfeeebe2c6431449779000c10f7002e4da91f0f84029e6f5d3534769c7fbc26c3c6dcd152233a692850a84f6f3ad07370
-
SSDEEP
49152:oONykdwTu98f1sO2xtqkvRId4vP2DRYlpPncdugvXtO9zUqu6ZJtc+wTrjBDkiQL:B/wqGaxZRlWRYlpovvXMzBLZJtc7Trlg
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-