General

  • Target

    SecuriteInfo.com.BehavesLike.Win32.PWSBanker.jc.23769

  • Size

    689KB

  • Sample

    201224-p38f6gwdf6

  • MD5

    f0092d7c04e468c5b19773b672566637

  • SHA1

    e9e5019301b5ece3d3d350f9be77cd07ff6e31c1

  • SHA256

    e18183cba24914f1855b8e9f371bfe580b48a80fc99d8bcf69e1d8921c638384

  • SHA512

    0e50480a883436ea888f9a97c25b769cfccfe559d41a4b9717c08c5ab603d255c07dc5d88e02e09c944cbd90f87e073c5ef73cd39bb08ea92fce01776649638c

Score
10/10

Malware Config

Targets

    • Target

      SecuriteInfo.com.BehavesLike.Win32.PWSBanker.jc.23769

    • Size

      689KB

    • MD5

      f0092d7c04e468c5b19773b672566637

    • SHA1

      e9e5019301b5ece3d3d350f9be77cd07ff6e31c1

    • SHA256

      e18183cba24914f1855b8e9f371bfe580b48a80fc99d8bcf69e1d8921c638384

    • SHA512

      0e50480a883436ea888f9a97c25b769cfccfe559d41a4b9717c08c5ab603d255c07dc5d88e02e09c944cbd90f87e073c5ef73cd39bb08ea92fce01776649638c

    Score
    10/10
    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks