General

  • Target

    1a2b2090b89823316ac5cb2f242a0213.exe

  • Size

    243KB

  • Sample

    201209-rhvv2j9zlj

  • MD5

    1a2b2090b89823316ac5cb2f242a0213

  • SHA1

    da0f490f21bda3d8c0fc0743981f5e4420a7bdc9

  • SHA256

    45c3f3af9f9d0c905dcb43df313ecf62364fa7cbab78236a3c049700556b1d63

  • SHA512

    2a815c327403b552669565a800d5b74d2d3669f8ce936ef7c6a56167ea0e5b824bcec3234babb2a4bc77799b77a92be6fb09602daaafd7c024f853677b2478b9

Score
10/10

Malware Config

Targets

    • Target

      1a2b2090b89823316ac5cb2f242a0213.exe

    • Size

      243KB

    • MD5

      1a2b2090b89823316ac5cb2f242a0213

    • SHA1

      da0f490f21bda3d8c0fc0743981f5e4420a7bdc9

    • SHA256

      45c3f3af9f9d0c905dcb43df313ecf62364fa7cbab78236a3c049700556b1d63

    • SHA512

      2a815c327403b552669565a800d5b74d2d3669f8ce936ef7c6a56167ea0e5b824bcec3234babb2a4bc77799b77a92be6fb09602daaafd7c024f853677b2478b9

    Score
    10/10
    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks