General

  • Target

    2cda6cc52d55eb599b699d52c4c1f3af9c0dc88f37b19695c3025c97dcc75814

  • Size

    1.0MB

  • Sample

    230922-dbh6cseb98

  • MD5

    480efe9851fbcb066a4d55d68aa3e873

  • SHA1

    3b4ab8d2d27c98e95e64af9501bfd5562ecfe4ca

  • SHA256

    2cda6cc52d55eb599b699d52c4c1f3af9c0dc88f37b19695c3025c97dcc75814

  • SHA512

    f994a6fa50f2e716e9b7dd685b7f658f095189778c8bcfa7e290ed08a428187ff57063139079ae8d9dda67431fdc50c80620ff2f8b8f0e716e1dda9103e5d8c9

  • SSDEEP

    24576:SyKr5BIpe96e5c16K9GtPt1I/JaUSWsF5sCMKDJ5:59YNcsK9CuYrLKCDV

Malware Config

Extracted

Family

redline

Botnet

tuxiu

C2

77.91.124.82:19071

Attributes
  • auth_value

    29610cdad07e7187eec70685a04b89fe

Targets

    • Target

      2cda6cc52d55eb599b699d52c4c1f3af9c0dc88f37b19695c3025c97dcc75814

    • Size

      1.0MB

    • MD5

      480efe9851fbcb066a4d55d68aa3e873

    • SHA1

      3b4ab8d2d27c98e95e64af9501bfd5562ecfe4ca

    • SHA256

      2cda6cc52d55eb599b699d52c4c1f3af9c0dc88f37b19695c3025c97dcc75814

    • SHA512

      f994a6fa50f2e716e9b7dd685b7f658f095189778c8bcfa7e290ed08a428187ff57063139079ae8d9dda67431fdc50c80620ff2f8b8f0e716e1dda9103e5d8c9

    • SSDEEP

      24576:SyKr5BIpe96e5c16K9GtPt1I/JaUSWsF5sCMKDJ5:59YNcsK9CuYrLKCDV

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks