General

  • Target

    7f1d00a862354132c7fd1d687127029e2def00fff1c86859d93297e1040744cc

  • Size

    1.0MB

  • Sample

    230921-raba1sad56

  • MD5

    2b93b37d76b5c1e2505269178244f698

  • SHA1

    611242a662d48070e35f8a27a3aa064db65b0be4

  • SHA256

    7f1d00a862354132c7fd1d687127029e2def00fff1c86859d93297e1040744cc

  • SHA512

    d030d526eb817dd9151e1e40079f29ea711be7b636b41574cc0034e1211fdc260ec81644d13417c7ccfc1df88668f9e211063521317caa8e3d9f4fc83b2f3b7d

  • SSDEEP

    24576:qy4lQcjbX99MKasX4puRZrpkpSoAcZMn:x4lQcLlasX4CZt0Rr

Malware Config

Extracted

Family

redline

Botnet

tuxiu

C2

77.91.124.82:19071

Attributes
  • auth_value

    29610cdad07e7187eec70685a04b89fe

Targets

    • Target

      7f1d00a862354132c7fd1d687127029e2def00fff1c86859d93297e1040744cc

    • Size

      1.0MB

    • MD5

      2b93b37d76b5c1e2505269178244f698

    • SHA1

      611242a662d48070e35f8a27a3aa064db65b0be4

    • SHA256

      7f1d00a862354132c7fd1d687127029e2def00fff1c86859d93297e1040744cc

    • SHA512

      d030d526eb817dd9151e1e40079f29ea711be7b636b41574cc0034e1211fdc260ec81644d13417c7ccfc1df88668f9e211063521317caa8e3d9f4fc83b2f3b7d

    • SSDEEP

      24576:qy4lQcjbX99MKasX4puRZrpkpSoAcZMn:x4lQcLlasX4CZt0Rr

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks