General

  • Target

    a9b69cf57145e7fe0585dedee384fb85a917a0fd862185927330384a3ee521b8

  • Size

    928KB

  • Sample

    230929-2jwy7afa7s

  • MD5

    0199093794d290a99beaf45e3c7f1fbe

  • SHA1

    6e87b68d126f3f18e7a837ab57b2c5ad5672d4a2

  • SHA256

    a9b69cf57145e7fe0585dedee384fb85a917a0fd862185927330384a3ee521b8

  • SHA512

    45994761e1ec171ad511793e52570e86cdf78cf149e2bed81c58894264150a0b4fbcbf823c115e9e4d37fcce4eddcf43ada8db4a6183d42b25834ba0c1c060d1

  • SSDEEP

    24576:w3y5bSCko/Ki/BfAgg3F0CCohgtuTppP6:wC5b2odf7g1fCoWu

Malware Config

Extracted

Family

redline

Botnet

luska

C2

77.91.124.55:19071

Attributes
  • auth_value

    a6797888f51a88afbfd8854a79ac9357

Targets

    • Target

      a9b69cf57145e7fe0585dedee384fb85a917a0fd862185927330384a3ee521b8

    • Size

      928KB

    • MD5

      0199093794d290a99beaf45e3c7f1fbe

    • SHA1

      6e87b68d126f3f18e7a837ab57b2c5ad5672d4a2

    • SHA256

      a9b69cf57145e7fe0585dedee384fb85a917a0fd862185927330384a3ee521b8

    • SHA512

      45994761e1ec171ad511793e52570e86cdf78cf149e2bed81c58894264150a0b4fbcbf823c115e9e4d37fcce4eddcf43ada8db4a6183d42b25834ba0c1c060d1

    • SSDEEP

      24576:w3y5bSCko/Ki/BfAgg3F0CCohgtuTppP6:wC5b2odf7g1fCoWu

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks