General

  • Target

    4ed06835dd64287ea65dbd0f16d164f7.zip

  • Size

    100KB

  • Sample

    210311-w9df6stlps

  • MD5

    05f95d3dd88975ef00ca4fab9ec41e8e

  • SHA1

    0568a973da69df5ce5c8a52b71e6bed959b00bad

  • SHA256

    ccfc26612edf56a1e5ac10fb478e64a442ac8d06af82760e6fdb6d6190314d0e

  • SHA512

    8a3992540223d57f5c687d5519e2b97d6245e7f3e5209b7866b4eac8a29717cbed2695f08e25d8dc59ec7c81fcbcd40cb00b5c121f96b9f8a9845377d3e82d0a

Score
10/10

Malware Config

Targets

    • Target

      4ed06835dd64287ea65dbd0f16d164f7

    • Size

      160KB

    • MD5

      4ed06835dd64287ea65dbd0f16d164f7

    • SHA1

      a9553e8e70e67f94c07d618c117f0f661d65dbec

    • SHA256

      1f296bceec7fc11b709d744bc6230b5997cfd5e210360d6f91542e2251c866a1

    • SHA512

      20d4436a56ad84ba7478ee82083cba28570f8db8fdeae48171ec5f846569f1e2af5cfed14fe40111368ee5e9ea462a2094b3d68b23bc2cf3beddb2999b505f0b

    Score
    10/10
    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Tasks