General

  • Target

    61eeef84d6840da73d35812ecfeab833182466d80518fcbc936bbc1613b05160

  • Size

    928KB

  • Sample

    230924-bwrxwsdc36

  • MD5

    dd64ab94f8346177503476fbf3e12acf

  • SHA1

    5b761019e1b95298f399d7c79dca0046fc56045b

  • SHA256

    61eeef84d6840da73d35812ecfeab833182466d80518fcbc936bbc1613b05160

  • SHA512

    85905bcb4ff0ce78971b976b3077d087b0c36440a9cdcd778998948378ea92e8467a38e599580e148cf5b51cb67f3f0580885bf0539cc36bffb999fe24c28671

  • SSDEEP

    24576:kyuzfr8P5/P921qVqtkKCzsoKFggc/8c01mY/kQYk8Xbo:zuPo/PhwtkKhJe7nCmQRp4

Malware Config

Extracted

Family

redline

Botnet

tuxiu

C2

77.91.124.82:19071

Attributes
  • auth_value

    29610cdad07e7187eec70685a04b89fe

Targets

    • Target

      61eeef84d6840da73d35812ecfeab833182466d80518fcbc936bbc1613b05160

    • Size

      928KB

    • MD5

      dd64ab94f8346177503476fbf3e12acf

    • SHA1

      5b761019e1b95298f399d7c79dca0046fc56045b

    • SHA256

      61eeef84d6840da73d35812ecfeab833182466d80518fcbc936bbc1613b05160

    • SHA512

      85905bcb4ff0ce78971b976b3077d087b0c36440a9cdcd778998948378ea92e8467a38e599580e148cf5b51cb67f3f0580885bf0539cc36bffb999fe24c28671

    • SSDEEP

      24576:kyuzfr8P5/P921qVqtkKCzsoKFggc/8c01mY/kQYk8Xbo:zuPo/PhwtkKhJe7nCmQRp4

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks