General

  • Target

    211c82899570f8a74385d9903991602319ab34ec3ef80fe7e409d41509b864bd

  • Size

    1.0MB

  • Sample

    230922-cy2qjsca5y

  • MD5

    06a28aa2e12e49ed7c3e935a050cf856

  • SHA1

    afa4fa6f499c3d5a7e7adc133005d25e5e58ef39

  • SHA256

    211c82899570f8a74385d9903991602319ab34ec3ef80fe7e409d41509b864bd

  • SHA512

    811d3f851aa761b132069b168cd5ee38f73e0f0c0e9df8a80908998faf02f0a36d1eb06b710ef1aad16505a24d95d0b1c9132dd8e6117b28e7652654a6a50252

  • SSDEEP

    24576:5yRhBmCLMYcvaQT8PBI1hzL2QSa5cuChk:spPLEaOz1hz9Saoh

Malware Config

Extracted

Family

redline

Botnet

tuxiu

C2

77.91.124.82:19071

Attributes
  • auth_value

    29610cdad07e7187eec70685a04b89fe

Targets

    • Target

      211c82899570f8a74385d9903991602319ab34ec3ef80fe7e409d41509b864bd

    • Size

      1.0MB

    • MD5

      06a28aa2e12e49ed7c3e935a050cf856

    • SHA1

      afa4fa6f499c3d5a7e7adc133005d25e5e58ef39

    • SHA256

      211c82899570f8a74385d9903991602319ab34ec3ef80fe7e409d41509b864bd

    • SHA512

      811d3f851aa761b132069b168cd5ee38f73e0f0c0e9df8a80908998faf02f0a36d1eb06b710ef1aad16505a24d95d0b1c9132dd8e6117b28e7652654a6a50252

    • SSDEEP

      24576:5yRhBmCLMYcvaQT8PBI1hzL2QSa5cuChk:spPLEaOz1hz9Saoh

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks