0068f1a9d11db46097fae660005c1228

General
Target

0068f1a9d11db46097fae660005c1228

Size

719KB

Sample

211021-qq8qsabcal

Score
10 /10
MD5

0068f1a9d11db46097fae660005c1228

SHA1

1a7fc24cccaa5bfeae87446a22605a0a475bb409

SHA256

88d8cfc5408b886989697c951a26e10c7ecd605bdebf3a4218dda7053002b926

SHA512

75525095421bf3866e4f465ed2ed89759230248ec08064865b6cf0435c254586960ee8c957a06a16a5c4693bd386338ec7554e820d94045674f172c141938a36

Malware Config

Extracted

Family redline
Botnet 1.0.2.0
C2

185.183.32.227:51498

Targets
Target

0068f1a9d11db46097fae660005c1228

MD5

0068f1a9d11db46097fae660005c1228

Filesize

719KB

Score
10 /10
SHA1

1a7fc24cccaa5bfeae87446a22605a0a475bb409

SHA256

88d8cfc5408b886989697c951a26e10c7ecd605bdebf3a4218dda7053002b926

SHA512

75525095421bf3866e4f465ed2ed89759230248ec08064865b6cf0435c254586960ee8c957a06a16a5c4693bd386338ec7554e820d94045674f172c141938a36

Tags

Signatures

  • RedLine

    Description

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    Tags

  • RedLine Payload

  • Executes dropped EXE

  • Loads dropped DLL

  • Suspicious use of SetThreadContext

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Discovery
            Execution
              Exfiltration
                Impact
                  Initial Access
                    Lateral Movement
                      Persistence
                        Privilege Escalation
                          Tasks

                          static1

                          behavioral1

                          10/10

                          behavioral2

                          10/10