General

  • Target

    ec243197b7cccc6749c8475e9c5cbaa1fab283b07c83f79739daa6fb0b62a35d

  • Size

    1.0MB

  • Sample

    230921-2kcxpsah6t

  • MD5

    2cd1788a546a36f2ce3058f3e2322c5d

  • SHA1

    2d507d3d96baffe5c2476587993d5e4ca4bf8d3b

  • SHA256

    ec243197b7cccc6749c8475e9c5cbaa1fab283b07c83f79739daa6fb0b62a35d

  • SHA512

    e857875c8533a69017cbcd8e8dd67227de878df87926674f3f21922d9a86079a70ba7b991085e9621fa7f0dd339c212f05205b5c4921ac2b6de6f6b9dfc08007

  • SSDEEP

    24576:0ywlcGlsfZs0Kk3xvtNURClruCcHIqdxwsoHXzY6Bv5NsJ4lb:D3GlgD6CruVoqdxwso3Rl5G4l

Malware Config

Extracted

Family

redline

Botnet

tuxiu

C2

77.91.124.82:19071

Attributes
  • auth_value

    29610cdad07e7187eec70685a04b89fe

Extracted

Family

redline

Botnet

trush

C2

77.91.124.82:19071

Attributes
  • auth_value

    c13814867cde8193679cd0cad2d774be

Targets

    • Target

      ec243197b7cccc6749c8475e9c5cbaa1fab283b07c83f79739daa6fb0b62a35d

    • Size

      1.0MB

    • MD5

      2cd1788a546a36f2ce3058f3e2322c5d

    • SHA1

      2d507d3d96baffe5c2476587993d5e4ca4bf8d3b

    • SHA256

      ec243197b7cccc6749c8475e9c5cbaa1fab283b07c83f79739daa6fb0b62a35d

    • SHA512

      e857875c8533a69017cbcd8e8dd67227de878df87926674f3f21922d9a86079a70ba7b991085e9621fa7f0dd339c212f05205b5c4921ac2b6de6f6b9dfc08007

    • SSDEEP

      24576:0ywlcGlsfZs0Kk3xvtNURClruCcHIqdxwsoHXzY6Bv5NsJ4lb:D3GlgD6CruVoqdxwso3Rl5G4l

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks