General

  • Target

    bee7ef45b6c6ed86a79e02fbcfc67425786a7d644c8c9bf520962066dbe86cf7

  • Size

    929KB

  • Sample

    230930-daqttagb9y

  • MD5

    e8979f8e72d1f8c9c3dd4277df8bdc58

  • SHA1

    bbef886efc3e4c983026410f02e6f706013c0ad2

  • SHA256

    bee7ef45b6c6ed86a79e02fbcfc67425786a7d644c8c9bf520962066dbe86cf7

  • SHA512

    8856c044d8505d484cdb4bf779c6692cc54be7f2a787c3995a4a3ada8ccc8ede72d263ea5bd940a32802fb458c44dc2f068c9f4dce0a29061bb7891ddf9fc760

  • SSDEEP

    24576:Tyw1s8SczKROI104DWtcX20Zkx+F9x1L+6U:mwIBROI1FKti20G+n+6

Malware Config

Extracted

Family

redline

Botnet

luska

C2

77.91.124.55:19071

Attributes
  • auth_value

    a6797888f51a88afbfd8854a79ac9357

Targets

    • Target

      bee7ef45b6c6ed86a79e02fbcfc67425786a7d644c8c9bf520962066dbe86cf7

    • Size

      929KB

    • MD5

      e8979f8e72d1f8c9c3dd4277df8bdc58

    • SHA1

      bbef886efc3e4c983026410f02e6f706013c0ad2

    • SHA256

      bee7ef45b6c6ed86a79e02fbcfc67425786a7d644c8c9bf520962066dbe86cf7

    • SHA512

      8856c044d8505d484cdb4bf779c6692cc54be7f2a787c3995a4a3ada8ccc8ede72d263ea5bd940a32802fb458c44dc2f068c9f4dce0a29061bb7891ddf9fc760

    • SSDEEP

      24576:Tyw1s8SczKROI104DWtcX20Zkx+F9x1L+6U:mwIBROI1FKti20G+n+6

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks