General

  • Target

    6b95623fff1ab2402a0f3ac5dd979d99f8b2d70f51e16b30548f9a8363ffc7b6

  • Size

    520KB

  • Sample

    230922-xsyrxshh4v

  • MD5

    32563931769e79ec7324397bd5b0d83e

  • SHA1

    dee7c93bdc30ff0b39cabf00457a0f56153d9e9c

  • SHA256

    6b95623fff1ab2402a0f3ac5dd979d99f8b2d70f51e16b30548f9a8363ffc7b6

  • SHA512

    d23f6fa8da3879bf3a75dc43f2b50207560b6885268eadb4dd81483b265bf82552540a59d309b7b802a802df83e9b996af7e1dfda2c48266365cd370eb5147ac

  • SSDEEP

    12288:lMrUy90RigiPH8vKhF5DhCDOTZRIvnt6MZVwIG:9yIvKhUGvIvBZVwR

Malware Config

Extracted

Family

redline

Botnet

trush

C2

77.91.124.82:19071

Attributes
  • auth_value

    c13814867cde8193679cd0cad2d774be

Targets

    • Target

      6b95623fff1ab2402a0f3ac5dd979d99f8b2d70f51e16b30548f9a8363ffc7b6

    • Size

      520KB

    • MD5

      32563931769e79ec7324397bd5b0d83e

    • SHA1

      dee7c93bdc30ff0b39cabf00457a0f56153d9e9c

    • SHA256

      6b95623fff1ab2402a0f3ac5dd979d99f8b2d70f51e16b30548f9a8363ffc7b6

    • SHA512

      d23f6fa8da3879bf3a75dc43f2b50207560b6885268eadb4dd81483b265bf82552540a59d309b7b802a802df83e9b996af7e1dfda2c48266365cd370eb5147ac

    • SSDEEP

      12288:lMrUy90RigiPH8vKhF5DhCDOTZRIvnt6MZVwIG:9yIvKhUGvIvBZVwR

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks