Source: | Binary string: \??\C:\Windows\System.ServiceModel.pdb source: AppLaunch.exe, 00000001.00000002.707479773.0000000005233000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\dll\System.ServiceModel.pdb source: AppLaunch.exe, 00000001.00000002.707479773.0000000005233000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: System.ServiceModel.pdb125563209-4053062332-1002_Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\Servererver32 source: AppLaunch.exe, 00000001.00000002.707479773.0000000005233000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\dll\System.ServiceModel.pdb{mw source: AppLaunch.exe, 00000001.00000002.707479773.0000000005233000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: indows\System.ServiceModel.pdbpdbdel.pdbI source: AppLaunch.exe, 00000001.00000002.707479773.0000000005233000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: System.ServiceModel.pdbH source: AppLaunch.exe, 00000001.00000002.707657974.000000000529B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\symbols\dll\System.ServiceModel.pdbr} source: AppLaunch.exe, 00000001.00000002.707672565.00000000052A7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: System.ServiceModel.pdb source: AppLaunch.exe, 00000001.00000002.707657974.000000000529B000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.pdb source: AppLaunch.exe, 00000001.00000002.707672565.00000000052A7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\symbols\dll\System.ServiceModel.pdba source: AppLaunch.exe, 00000001.00000002.707672565.00000000052A7000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \Downloads\NewPublish\udezfxe44vl12u\main.pdb source: 5Qq54zuREl.exe |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: unknown | TCP traffic detected without corresponding DNS query: 195.54.170.157 |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/ |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/faultL |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequence |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessage |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/ |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/ |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id1 |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id10 |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id10Response |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id11 |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id11Response |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id12 |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id12Response |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id13 |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id13Response |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id14 |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id14Response |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id15 |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id15Response |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id16 |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id16Response |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id17 |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id17Response |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id18 |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id18Response |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id19 |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id19Response |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id1Response |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id2 |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id20 |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id20Response |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id21 |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id21Response |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id22 |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id22Response |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id23 |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id23Response |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id24 |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id24Response |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id2Response |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id3 |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id3Response |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id4 |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id4Response |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id5 |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id5Response |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id6 |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id6Response |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id7 |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id7Response |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id8 |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id8Response |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id9 |
Source: AppLaunch.exe, 00000001.00000002.708165332.0000000006DA1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id9Response |
Source: 5Qq54zuREl.exe, 5Qq54zuREl.exe, 00000000.00000000.317838453.0000000001158000.00000004.00000001.01000000.00000003.sdmp, 5Qq54zuREl.exe, 00000000.00000003.311786578.0000000002732000.00000040.00001000.00020000.00000000.sdmp, AppLaunch.exe, 00000001.00000000.311760106.0000000000402000.00000040.00000400.00020000.00000000.sdmp | String found in binary or memory: https://api.ip.sb/ip |
Source: 0.3.5Qq54zuREl.exe.2730000.0.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 0.3.5Qq54zuREl.exe.2730000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_3d9371fd Author: unknown |
Source: 1.0.AppLaunch.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 1.0.AppLaunch.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_3d9371fd Author: unknown |
Source: 0.0.5Qq54zuREl.exe.1080000.2.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 0.0.5Qq54zuREl.exe.1080000.2.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_3d9371fd Author: unknown |
Source: 0.0.5Qq54zuREl.exe.1080000.0.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 0.0.5Qq54zuREl.exe.1080000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_3d9371fd Author: unknown |
Source: 0.2.5Qq54zuREl.exe.1080000.0.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 0.2.5Qq54zuREl.exe.1080000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_3d9371fd Author: unknown |
Source: 0.0.5Qq54zuREl.exe.1080000.1.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 0.0.5Qq54zuREl.exe.1080000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_3d9371fd Author: unknown |
Source: 00000001.00000000.311760106.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_3d9371fd Author: unknown |
Source: 00000000.00000000.317838453.0000000001158000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_3d9371fd Author: unknown |
Source: 00000000.00000000.316874184.0000000001158000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_3d9371fd Author: unknown |
Source: 00000000.00000002.333886087.0000000001158000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_3d9371fd Author: unknown |
Source: 00000000.00000003.311786578.0000000002732000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_3d9371fd Author: unknown |
Source: 0.3.5Qq54zuREl.exe.2730000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 0.3.5Qq54zuREl.exe.2730000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_3d9371fd reference_sample = 0ec522dfd9307772bf8b600a8b91fd6facd0bf4090c2b386afd20e955b25206a, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 2d7ff7894b267ba37a2d376b022bae45c4948ef3a70b1af986e7492949b5ae23, id = 3d9371fd-c094-40fc-baf8-f0e9e9a54ff9, last_modified = 2022-04-12 |
Source: 1.0.AppLaunch.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 1.0.AppLaunch.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_3d9371fd reference_sample = 0ec522dfd9307772bf8b600a8b91fd6facd0bf4090c2b386afd20e955b25206a, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 2d7ff7894b267ba37a2d376b022bae45c4948ef3a70b1af986e7492949b5ae23, id = 3d9371fd-c094-40fc-baf8-f0e9e9a54ff9, last_modified = 2022-04-12 |
Source: 0.0.5Qq54zuREl.exe.1080000.2.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 0.0.5Qq54zuREl.exe.1080000.2.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_3d9371fd reference_sample = 0ec522dfd9307772bf8b600a8b91fd6facd0bf4090c2b386afd20e955b25206a, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 2d7ff7894b267ba37a2d376b022bae45c4948ef3a70b1af986e7492949b5ae23, id = 3d9371fd-c094-40fc-baf8-f0e9e9a54ff9, last_modified = 2022-04-12 |
Source: 0.0.5Qq54zuREl.exe.1080000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 0.0.5Qq54zuREl.exe.1080000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_3d9371fd reference_sample = 0ec522dfd9307772bf8b600a8b91fd6facd0bf4090c2b386afd20e955b25206a, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 2d7ff7894b267ba37a2d376b022bae45c4948ef3a70b1af986e7492949b5ae23, id = 3d9371fd-c094-40fc-baf8-f0e9e9a54ff9, last_modified = 2022-04-12 |
Source: 0.2.5Qq54zuREl.exe.1080000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 0.2.5Qq54zuREl.exe.1080000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_3d9371fd reference_sample = 0ec522dfd9307772bf8b600a8b91fd6facd0bf4090c2b386afd20e955b25206a, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 2d7ff7894b267ba37a2d376b022bae45c4948ef3a70b1af986e7492949b5ae23, id = 3d9371fd-c094-40fc-baf8-f0e9e9a54ff9, last_modified = 2022-04-12 |
Source: 0.0.5Qq54zuREl.exe.1080000.1.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 0.0.5Qq54zuREl.exe.1080000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_3d9371fd reference_sample = 0ec522dfd9307772bf8b600a8b91fd6facd0bf4090c2b386afd20e955b25206a, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 2d7ff7894b267ba37a2d376b022bae45c4948ef3a70b1af986e7492949b5ae23, id = 3d9371fd-c094-40fc-baf8-f0e9e9a54ff9, last_modified = 2022-04-12 |
Source: 00000001.00000000.311760106.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_3d9371fd reference_sample = 0ec522dfd9307772bf8b600a8b91fd6facd0bf4090c2b386afd20e955b25206a, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 2d7ff7894b267ba37a2d376b022bae45c4948ef3a70b1af986e7492949b5ae23, id = 3d9371fd-c094-40fc-baf8-f0e9e9a54ff9, last_modified = 2022-04-12 |
Source: 00000000.00000000.317838453.0000000001158000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_3d9371fd reference_sample = 0ec522dfd9307772bf8b600a8b91fd6facd0bf4090c2b386afd20e955b25206a, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 2d7ff7894b267ba37a2d376b022bae45c4948ef3a70b1af986e7492949b5ae23, id = 3d9371fd-c094-40fc-baf8-f0e9e9a54ff9, last_modified = 2022-04-12 |
Source: 00000000.00000000.316874184.0000000001158000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_3d9371fd reference_sample = 0ec522dfd9307772bf8b600a8b91fd6facd0bf4090c2b386afd20e955b25206a, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 2d7ff7894b267ba37a2d376b022bae45c4948ef3a70b1af986e7492949b5ae23, id = 3d9371fd-c094-40fc-baf8-f0e9e9a54ff9, last_modified = 2022-04-12 |
Source: 00000000.00000002.333886087.0000000001158000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_3d9371fd reference_sample = 0ec522dfd9307772bf8b600a8b91fd6facd0bf4090c2b386afd20e955b25206a, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 2d7ff7894b267ba37a2d376b022bae45c4948ef3a70b1af986e7492949b5ae23, id = 3d9371fd-c094-40fc-baf8-f0e9e9a54ff9, last_modified = 2022-04-12 |
Source: 00000000.00000003.311786578.0000000002732000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_3d9371fd reference_sample = 0ec522dfd9307772bf8b600a8b91fd6facd0bf4090c2b386afd20e955b25206a, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 2d7ff7894b267ba37a2d376b022bae45c4948ef3a70b1af986e7492949b5ae23, id = 3d9371fd-c094-40fc-baf8-f0e9e9a54ff9, last_modified = 2022-04-12 |