General

  • Target

    8e729676586171ff474ce8ea524400d6aa99607ce7c9ab3efc5db20a6f910fdd

  • Size

    696KB

  • Sample

    230921-vsxhrabe68

  • MD5

    afded750051093d03a74fff5eebc9b39

  • SHA1

    5c57d9acdf477021372111cbc096da0030217b6f

  • SHA256

    8e729676586171ff474ce8ea524400d6aa99607ce7c9ab3efc5db20a6f910fdd

  • SHA512

    dba3be98195ba4f0b62e3cffa4d25bda8f2ad34ccc61325e3deb324e265f67a136e7bcb1f3ab9142a998b1ae52ddb9b9ff3af5839fe92f7fd85a33e4d2d2a3f0

  • SSDEEP

    12288:/Mr5y90UroYxj48HVRDdsdAlusZ+WARAjIvWpWILs+S:uygSj48V8euUOKIvWpG+S

Malware Config

Extracted

Family

redline

Botnet

tuxiu

C2

77.91.124.82:19071

Attributes
  • auth_value

    29610cdad07e7187eec70685a04b89fe

Targets

    • Target

      8e729676586171ff474ce8ea524400d6aa99607ce7c9ab3efc5db20a6f910fdd

    • Size

      696KB

    • MD5

      afded750051093d03a74fff5eebc9b39

    • SHA1

      5c57d9acdf477021372111cbc096da0030217b6f

    • SHA256

      8e729676586171ff474ce8ea524400d6aa99607ce7c9ab3efc5db20a6f910fdd

    • SHA512

      dba3be98195ba4f0b62e3cffa4d25bda8f2ad34ccc61325e3deb324e265f67a136e7bcb1f3ab9142a998b1ae52ddb9b9ff3af5839fe92f7fd85a33e4d2d2a3f0

    • SSDEEP

      12288:/Mr5y90UroYxj48HVRDdsdAlusZ+WARAjIvWpWILs+S:uygSj48V8euUOKIvWpG+S

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks