General

  • Target

    511499b1e4570b341ce0d5a69b557acf74f04b0a0593e021c6a99c5320ea8ca2

  • Size

    1.0MB

  • Sample

    231001-blzvragc5t

  • MD5

    055558f2e8bd64ecb4362d23de17a035

  • SHA1

    43eb99ccace3cbdd2e787068de3611f086290f5c

  • SHA256

    511499b1e4570b341ce0d5a69b557acf74f04b0a0593e021c6a99c5320ea8ca2

  • SHA512

    76f01d6fd75ecaf3461bc1a975f8a2e5793f60b8e1c57f97c19b8549e431fbc6c323122729bb5e84c9bc0b4326d93d6f1228f5aad429aa80f7052655f238e238

  • SSDEEP

    24576:KyClxQucArZuky84jRDOjMNR2aP+tb4kHj0LQJ:RCvQu1rZufLRDOIX/mhHj0L

Malware Config

Extracted

Family

redline

Botnet

luska

C2

77.91.124.55:19071

Attributes
  • auth_value

    a6797888f51a88afbfd8854a79ac9357

Targets

    • Target

      511499b1e4570b341ce0d5a69b557acf74f04b0a0593e021c6a99c5320ea8ca2

    • Size

      1.0MB

    • MD5

      055558f2e8bd64ecb4362d23de17a035

    • SHA1

      43eb99ccace3cbdd2e787068de3611f086290f5c

    • SHA256

      511499b1e4570b341ce0d5a69b557acf74f04b0a0593e021c6a99c5320ea8ca2

    • SHA512

      76f01d6fd75ecaf3461bc1a975f8a2e5793f60b8e1c57f97c19b8549e431fbc6c323122729bb5e84c9bc0b4326d93d6f1228f5aad429aa80f7052655f238e238

    • SSDEEP

      24576:KyClxQucArZuky84jRDOjMNR2aP+tb4kHj0LQJ:RCvQu1rZufLRDOIX/mhHj0L

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks