General

  • Target

    c53f1fd18ee3d2e35471fc7e103a4aa7.zip

  • Size

    99KB

  • Sample

    210311-xcthe41k9n

  • MD5

    da75659171efeecdeb3b971d824d86f1

  • SHA1

    c87f45649274a3a35063ddf0b0b788df63fcee27

  • SHA256

    58f3fbaf758d8a79e562e05ae9bff548eff643329ce96cac21ce763d0dedcd2d

  • SHA512

    abd24480f8f1f96d4fe86d5c50ffa5927629428a817835fe1d371f5889e568f2ca2a2b6a39349a0dd1c03d4be977f2d9d759bf6ca0b69dcf4c8b8bb5deaa9f63

Score
10/10

Malware Config

Targets

    • Target

      c53f1fd18ee3d2e35471fc7e103a4aa7

    • Size

      159KB

    • MD5

      c53f1fd18ee3d2e35471fc7e103a4aa7

    • SHA1

      486ae0e4b221a79ac6cb29268636320f0ff3a33f

    • SHA256

      1109998f685c71644a6d8e3b9c55b9772f970eb0c981e05b2cacb30e73e76e26

    • SHA512

      1d193c1343dbdb34d1b933a3efd6f892d5f91f5a87f4bba180dc23703e3a2ddb4c5a33bf3062f2e9b7eb169129895984af413c0f9e6c155fe5d8f662a19ca5a6

    Score
    10/10
    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks