General

  • Target

    d20f7b0c9a0aa80a6e70acce6d857362.exe

  • Size

    1.3MB

  • Sample

    220129-g4cqtseehn

  • MD5

    d20f7b0c9a0aa80a6e70acce6d857362

  • SHA1

    980806865a13e50ea77a8d71fb52221b9014051b

  • SHA256

    24a80a4b6c6625d42c81248be8783903cd10d4704763dc725955900fab72dfab

  • SHA512

    c3d51e512f32e65ee5bb5dd4c495d4a0fd62f5e32aa6b7de0aa597200a1b320726cfd59c3f29831f77614e0efdae0f02321ac20efa041681f073c94d826df6b4

Score
10/10

Malware Config

Extracted

Family

redline

C2

193.56.146.49:13738

Targets

    • Target

      d20f7b0c9a0aa80a6e70acce6d857362.exe

    • Size

      1.3MB

    • MD5

      d20f7b0c9a0aa80a6e70acce6d857362

    • SHA1

      980806865a13e50ea77a8d71fb52221b9014051b

    • SHA256

      24a80a4b6c6625d42c81248be8783903cd10d4704763dc725955900fab72dfab

    • SHA512

      c3d51e512f32e65ee5bb5dd4c495d4a0fd62f5e32aa6b7de0aa597200a1b320726cfd59c3f29831f77614e0efdae0f02321ac20efa041681f073c94d826df6b4

    Score
    10/10
    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks