General

  • Target

    b54f1e7e6b8eeb9df82a9af236f0bce9.exe

  • Size

    21KB

  • Sample

    210218-j26rnhztha

  • MD5

    b54f1e7e6b8eeb9df82a9af236f0bce9

  • SHA1

    3dbf6afb18022e701bf85abd83437bf70c27a73a

  • SHA256

    f8ecf503c77e2e7a97a626cb5bcd6954eca80c2a7e2963fd916ce9d0d17b8be0

  • SHA512

    a74d18d9013a46e06acd3754ebe6ea4171b090c6704c63387eaf14960fed29c5f13bf839e85db5e4aa08984e61c2d4c8e2f04735bda28f5820ab74a3c393ab78

Score
10/10

Malware Config

Targets

    • Target

      b54f1e7e6b8eeb9df82a9af236f0bce9.exe

    • Size

      21KB

    • MD5

      b54f1e7e6b8eeb9df82a9af236f0bce9

    • SHA1

      3dbf6afb18022e701bf85abd83437bf70c27a73a

    • SHA256

      f8ecf503c77e2e7a97a626cb5bcd6954eca80c2a7e2963fd916ce9d0d17b8be0

    • SHA512

      a74d18d9013a46e06acd3754ebe6ea4171b090c6704c63387eaf14960fed29c5f13bf839e85db5e4aa08984e61c2d4c8e2f04735bda28f5820ab74a3c393ab78

    Score
    10/10
    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Tasks