General

  • Target

    ddc096ab07d376746791bd9ea006317375ed7b9832b6d46d507d51bb43f4ada3

  • Size

    1.1MB

  • Sample

    230904-j6zz9afc22

  • MD5

    fbb1b3eef22dfa30d5d47e0303633449

  • SHA1

    95649051d8c6087f893996fe431f2b5d1c7e3c9c

  • SHA256

    ddc096ab07d376746791bd9ea006317375ed7b9832b6d46d507d51bb43f4ada3

  • SHA512

    4cb97ecf5504fc0d7199447310c47ccb4214f4787289fc2bac40049c95831ec1b257b4652676e2c9da6bcd66aa114afdbb49120d932cb20e07ca6ebb583ae47b

  • SSDEEP

    24576:djXuVeHaPY7ItVrA3CQ4WkydRxEUIoTGa0pTr:djAY7ItVC4WvP6Fr

Malware Config

Extracted

Family

redline

Botnet

040923_rc

C2

04septgo.tuktuk.ug:11290

Attributes
  • auth_value

    47c23aee408443d5484756dcc468f53a

Targets

    • Target

      ddc096ab07d376746791bd9ea006317375ed7b9832b6d46d507d51bb43f4ada3

    • Size

      1.1MB

    • MD5

      fbb1b3eef22dfa30d5d47e0303633449

    • SHA1

      95649051d8c6087f893996fe431f2b5d1c7e3c9c

    • SHA256

      ddc096ab07d376746791bd9ea006317375ed7b9832b6d46d507d51bb43f4ada3

    • SHA512

      4cb97ecf5504fc0d7199447310c47ccb4214f4787289fc2bac40049c95831ec1b257b4652676e2c9da6bcd66aa114afdbb49120d932cb20e07ca6ebb583ae47b

    • SSDEEP

      24576:djXuVeHaPY7ItVrA3CQ4WkydRxEUIoTGa0pTr:djAY7ItVC4WvP6Fr

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Uses the VBS compiler for execution

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks