General

  • Target

    04c7412847994129e5af7483ec3d90cd60951413b857190da79fb82ea979b2da

  • Size

    1.4MB

  • Sample

    230920-mwg88sfg9s

  • MD5

    387d1293c9803a0f01d295c618f4abc0

  • SHA1

    d9066f9d18f74c297ccf423b1e7bbdc87dd3fc67

  • SHA256

    04c7412847994129e5af7483ec3d90cd60951413b857190da79fb82ea979b2da

  • SHA512

    40c1d78417adedb7f49018455c2dc1c90d63fcde0b8af3b0df82bddef842dc63990cf7cda71c9b42ab8a54f0851f3c5d8859f7ff981651e3601380952302f079

  • SSDEEP

    24576:EyCO8gce52H6yP9QMSWoDVzTmU1btad01UVLGcO0HyAGrGnlWncV/p2R23:TCO8W2HdCaoVTh1btaFLGcO1rklT/

Malware Config

Extracted

Family

redline

Botnet

trush

C2

77.91.124.82:19071

Attributes
  • auth_value

    c13814867cde8193679cd0cad2d774be

Targets

    • Target

      04c7412847994129e5af7483ec3d90cd60951413b857190da79fb82ea979b2da

    • Size

      1.4MB

    • MD5

      387d1293c9803a0f01d295c618f4abc0

    • SHA1

      d9066f9d18f74c297ccf423b1e7bbdc87dd3fc67

    • SHA256

      04c7412847994129e5af7483ec3d90cd60951413b857190da79fb82ea979b2da

    • SHA512

      40c1d78417adedb7f49018455c2dc1c90d63fcde0b8af3b0df82bddef842dc63990cf7cda71c9b42ab8a54f0851f3c5d8859f7ff981651e3601380952302f079

    • SSDEEP

      24576:EyCO8gce52H6yP9QMSWoDVzTmU1btad01UVLGcO0HyAGrGnlWncV/p2R23:TCO8W2HdCaoVTh1btaFLGcO1rklT/

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks