General

  • Target

    d5a3a3a01060c1632fa6508b8d267b08.exe

  • Size

    980KB

  • Sample

    201229-d6ssdkd85j

  • MD5

    d5a3a3a01060c1632fa6508b8d267b08

  • SHA1

    85ca1b1273a6a063a60b72bde65825c29da05b4f

  • SHA256

    931210400364c50e45ab51294521789d451406a9538a38fd99cce928c9188f53

  • SHA512

    ffb0d63748eaa509fc1c491a819634b8112de2701760d0abc955592817b8eefc3f934cdf9e25c75510661a94f048af98736dbe2df4b4f62b7655fa1e1f8535f6

Malware Config

Targets

    • Target

      d5a3a3a01060c1632fa6508b8d267b08.exe

    • Size

      980KB

    • MD5

      d5a3a3a01060c1632fa6508b8d267b08

    • SHA1

      85ca1b1273a6a063a60b72bde65825c29da05b4f

    • SHA256

      931210400364c50e45ab51294521789d451406a9538a38fd99cce928c9188f53

    • SHA512

      ffb0d63748eaa509fc1c491a819634b8112de2701760d0abc955592817b8eefc3f934cdf9e25c75510661a94f048af98736dbe2df4b4f62b7655fa1e1f8535f6

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks