General

  • Target

    da0baba4a78ada89b12bb09154ce8845.exe

  • Size

    594KB

  • Sample

    201228-pygjayv3ts

  • MD5

    da0baba4a78ada89b12bb09154ce8845

  • SHA1

    3093fb1feace2a89311923c283083e61ef47cde8

  • SHA256

    c96f35457cc26c36104f053cb445c0835ead6434c3ce57adaae7911b2ab51d5c

  • SHA512

    932709db0d24285e220253bbb0262322dbd567fc77888541a0664d1604eae3221017471c0b401be1196a3fd428c03d28153a2a41cf89482465485ab93d8ae527

Score
10/10

Malware Config

Targets

    • Target

      da0baba4a78ada89b12bb09154ce8845.exe

    • Size

      594KB

    • MD5

      da0baba4a78ada89b12bb09154ce8845

    • SHA1

      3093fb1feace2a89311923c283083e61ef47cde8

    • SHA256

      c96f35457cc26c36104f053cb445c0835ead6434c3ce57adaae7911b2ab51d5c

    • SHA512

      932709db0d24285e220253bbb0262322dbd567fc77888541a0664d1604eae3221017471c0b401be1196a3fd428c03d28153a2a41cf89482465485ab93d8ae527

    Score
    10/10
    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks