General

  • Target

    c9695798ea1e94e39d82b6624fec3f9aea38086b109de06a7e4bd3411e998fa9

  • Size

    1.0MB

  • Sample

    230930-t6dgcsdh7x

  • MD5

    26a94d3fea2244861be8140c6acb2b49

  • SHA1

    de730504e44110a9f1923b858cd5ee2a3cd72cd2

  • SHA256

    c9695798ea1e94e39d82b6624fec3f9aea38086b109de06a7e4bd3411e998fa9

  • SHA512

    7b5515a581cfed0afbd99eef41315a82e0494a814dc16f989e1d14a65288d1c67c3f4a7d9892e68f499b8f6b6782b9da72a38887724fe744b532ff93854e1d65

  • SSDEEP

    24576:KydZMxMXxhyGRJdi2fcwelXhb2HzelX5uvbDvSQG:RdZkMbvd/krlRbUz8X5uTD

Malware Config

Extracted

Family

redline

Botnet

luska

C2

77.91.124.55:19071

Attributes
  • auth_value

    a6797888f51a88afbfd8854a79ac9357

Targets

    • Target

      c9695798ea1e94e39d82b6624fec3f9aea38086b109de06a7e4bd3411e998fa9

    • Size

      1.0MB

    • MD5

      26a94d3fea2244861be8140c6acb2b49

    • SHA1

      de730504e44110a9f1923b858cd5ee2a3cd72cd2

    • SHA256

      c9695798ea1e94e39d82b6624fec3f9aea38086b109de06a7e4bd3411e998fa9

    • SHA512

      7b5515a581cfed0afbd99eef41315a82e0494a814dc16f989e1d14a65288d1c67c3f4a7d9892e68f499b8f6b6782b9da72a38887724fe744b532ff93854e1d65

    • SSDEEP

      24576:KydZMxMXxhyGRJdi2fcwelXhb2HzelX5uvbDvSQG:RdZkMbvd/krlRbUz8X5uTD

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks