General

  • Target

    cc514cc4a2498982dc3505ada5f4fded15a3c3482f5944d4fb7746f040095d1d

  • Size

    212KB

  • Sample

    210205-vpfy73chy6

  • MD5

    cd513b84207569e95cf1ca73170e0818

  • SHA1

    1fa2db78e25bea5ce93015c96e30f29971292479

  • SHA256

    cc514cc4a2498982dc3505ada5f4fded15a3c3482f5944d4fb7746f040095d1d

  • SHA512

    b562bf7c625d3b3769aae685f4f102c6f7cf53c783768b59b90a599aff7ed04d18197282c553cfea38b514368939c98ad90da969f5fc5ad7d622bb700edfa59f

Score
10/10

Malware Config

Targets

    • Target

      cc514cc4a2498982dc3505ada5f4fded15a3c3482f5944d4fb7746f040095d1d

    • Size

      212KB

    • MD5

      cd513b84207569e95cf1ca73170e0818

    • SHA1

      1fa2db78e25bea5ce93015c96e30f29971292479

    • SHA256

      cc514cc4a2498982dc3505ada5f4fded15a3c3482f5944d4fb7746f040095d1d

    • SHA512

      b562bf7c625d3b3769aae685f4f102c6f7cf53c783768b59b90a599aff7ed04d18197282c553cfea38b514368939c98ad90da969f5fc5ad7d622bb700edfa59f

    Score
    10/10
    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks