General

  • Target

    94ac922ff33ed26ebb0e40ffc64560091ab9c4e07c090edc0d45b015e2d26dfe

  • Size

    514KB

  • Sample

    230922-sxcb9sah29

  • MD5

    b674bcaf789b270803b1244b22eb13d2

  • SHA1

    d947bde1f02df7d439a10ddd8832fa441ae15a43

  • SHA256

    94ac922ff33ed26ebb0e40ffc64560091ab9c4e07c090edc0d45b015e2d26dfe

  • SHA512

    aa9d6e78e7c522f02552480849fafc1046121fe10d12ade800a0a87f8b089b5de21b853d7ad37e6f312a954532242c3d0e5c7cef830c0ed7ec25481704ec433d

  • SSDEEP

    6144:KSy+bnr+sp0yN90QEwYGOtJsptTK53ma7RiY73SkshfUwjDXE2M/HKCSd9S5T4FT:2Mr4y90fd30I550Yb4fUwctJQd528mw

Malware Config

Extracted

Family

redline

Botnet

trush

C2

77.91.124.82:19071

Attributes
  • auth_value

    c13814867cde8193679cd0cad2d774be

Targets

    • Target

      94ac922ff33ed26ebb0e40ffc64560091ab9c4e07c090edc0d45b015e2d26dfe

    • Size

      514KB

    • MD5

      b674bcaf789b270803b1244b22eb13d2

    • SHA1

      d947bde1f02df7d439a10ddd8832fa441ae15a43

    • SHA256

      94ac922ff33ed26ebb0e40ffc64560091ab9c4e07c090edc0d45b015e2d26dfe

    • SHA512

      aa9d6e78e7c522f02552480849fafc1046121fe10d12ade800a0a87f8b089b5de21b853d7ad37e6f312a954532242c3d0e5c7cef830c0ed7ec25481704ec433d

    • SSDEEP

      6144:KSy+bnr+sp0yN90QEwYGOtJsptTK53ma7RiY73SkshfUwjDXE2M/HKCSd9S5T4FT:2Mr4y90fd30I550Yb4fUwctJQd528mw

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks