General

  • Target

    ec8b389edf6738f9b561418f4b0b0d9c.zip

  • Size

    99KB

  • Sample

    210311-ac5kyvf5ys

  • MD5

    31f93f80119f106e44f711af1d097e63

  • SHA1

    9c4db88904d9c07260156d3edca4b85b52198f0f

  • SHA256

    777517ddd32629e22c99171aafcd4921213c4995ed5ed0f94eb35ca89c6371f8

  • SHA512

    177d1d09b1dc7ff7fa114ce97395219363392ce03c7bba701f2bc44a0a50e9c2036f889614d9c238758e57f56143949e7b0009c091c925ce32bdf02a3944a907

Score
10/10

Malware Config

Targets

    • Target

      ec8b389edf6738f9b561418f4b0b0d9c

    • Size

      159KB

    • MD5

      ec8b389edf6738f9b561418f4b0b0d9c

    • SHA1

      b0047154ae3e3626ca02a54ee315fdec7a1656b7

    • SHA256

      14ed09b6cec2b4465de883ce16001c309436f916fb1d3b84d41f84e39f4712ed

    • SHA512

      f75d26c333fb14d06a0537e2a5adb023d71d91724f75795c795e916f8b5a7fa2050204febe361c54245462c633a15badbf886b9e30bf3e2e337e3b9338480029

    Score
    10/10
    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Tasks