General

  • Target

    807b69019bfc072f1be908e269ba322d5cbf67654c62b5eb294c236d56bbca27

  • Size

    1.0MB

  • Sample

    230922-b28gtsbe6w

  • MD5

    a3f40755c687b9f2bb1559ae88e29e58

  • SHA1

    a0fa2e549298a09c6e57d4ae22edeaf5ff31f3d2

  • SHA256

    807b69019bfc072f1be908e269ba322d5cbf67654c62b5eb294c236d56bbca27

  • SHA512

    f4e416b04a0ac395c87ea7a9392f62e3f506aad0047792f29c53852f80046b3e66b7c6d3586af57806dda7208405ca230adb17c21142340a629aea7d13c79faf

  • SSDEEP

    24576:6y48N7uTh8q2h02IFsHeea21i1Ct5ArPM:BDVuThn2qbFs+i1CCt5Q

Malware Config

Extracted

Family

redline

Botnet

tuxiu

C2

77.91.124.82:19071

Attributes
  • auth_value

    29610cdad07e7187eec70685a04b89fe

Targets

    • Target

      807b69019bfc072f1be908e269ba322d5cbf67654c62b5eb294c236d56bbca27

    • Size

      1.0MB

    • MD5

      a3f40755c687b9f2bb1559ae88e29e58

    • SHA1

      a0fa2e549298a09c6e57d4ae22edeaf5ff31f3d2

    • SHA256

      807b69019bfc072f1be908e269ba322d5cbf67654c62b5eb294c236d56bbca27

    • SHA512

      f4e416b04a0ac395c87ea7a9392f62e3f506aad0047792f29c53852f80046b3e66b7c6d3586af57806dda7208405ca230adb17c21142340a629aea7d13c79faf

    • SSDEEP

      24576:6y48N7uTh8q2h02IFsHeea21i1Ct5ArPM:BDVuThn2qbFs+i1CCt5Q

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks