General

  • Target

    0c4e32c6adfd5de13ecfaccb462cb5f9.exe

  • Size

    594KB

  • Sample

    201228-kts522glyx

  • MD5

    0c4e32c6adfd5de13ecfaccb462cb5f9

  • SHA1

    2ab3571f7449baadb3d7bfbe99bc7aface8cc42c

  • SHA256

    71aaff890e5c76962463e4f1c102819a6f7469e76139b5b49282f5f596d7ea36

  • SHA512

    016bc8623945a45d44cae5ff8bc822a7ebc1d84dcc46691fd523f612aeb5802a16db875425d4542ed98ec2bac97cb8227c940154bd511f6a12797c10c5b5e532

Score
10/10

Malware Config

Targets

    • Target

      0c4e32c6adfd5de13ecfaccb462cb5f9.exe

    • Size

      594KB

    • MD5

      0c4e32c6adfd5de13ecfaccb462cb5f9

    • SHA1

      2ab3571f7449baadb3d7bfbe99bc7aface8cc42c

    • SHA256

      71aaff890e5c76962463e4f1c102819a6f7469e76139b5b49282f5f596d7ea36

    • SHA512

      016bc8623945a45d44cae5ff8bc822a7ebc1d84dcc46691fd523f612aeb5802a16db875425d4542ed98ec2bac97cb8227c940154bd511f6a12797c10c5b5e532

    Score
    10/10
    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks