General
-
Target
https://bit.ly/32QWty2
-
Sample
250203-ctyhbswqey
Score
10/10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://bit.ly/32QWty2
Resource
win11-20241007-en
21 signatures
300 seconds
Malware Config
Extracted
Family
redline
C2
185.223.92.157:44160
Attributes
-
auth_value
4e5c6e2ba7063e715c19d342d7f1bcc9
Targets
-
-
Target
https://bit.ly/32QWty2
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-