General

  • Target

    NEAS.3d129e395c299cd8bef2a9880c62c4fe35cef2ecec681cae420f7004e248501d_JC.exe

  • Size

    1.1MB

  • Sample

    231008-ryk55ada9v

  • MD5

    27930f7be29f2457a3328583eca1da68

  • SHA1

    e5e5e63bfb9eda185a9eddc52751c184e0c37de3

  • SHA256

    3d129e395c299cd8bef2a9880c62c4fe35cef2ecec681cae420f7004e248501d

  • SHA512

    d6d9c61c8f4f498db7a61db3437d4e10b23f620be22936d963c71ca815e365ef5a6bc9314f8789c32b1bd5759c6b56d88274d634cbbcad1ab25df647d0b7f3eb

  • SSDEEP

    24576:kyT8dEaIzEzoNE54jigmCwZrIqXPaYbNi6qh9vuO:zitLz0ji58qraRu

Malware Config

Extracted

Family

redline

Botnet

lutyr

C2

77.91.124.55:19071

Targets

    • Target

      NEAS.3d129e395c299cd8bef2a9880c62c4fe35cef2ecec681cae420f7004e248501d_JC.exe

    • Size

      1.1MB

    • MD5

      27930f7be29f2457a3328583eca1da68

    • SHA1

      e5e5e63bfb9eda185a9eddc52751c184e0c37de3

    • SHA256

      3d129e395c299cd8bef2a9880c62c4fe35cef2ecec681cae420f7004e248501d

    • SHA512

      d6d9c61c8f4f498db7a61db3437d4e10b23f620be22936d963c71ca815e365ef5a6bc9314f8789c32b1bd5759c6b56d88274d634cbbcad1ab25df647d0b7f3eb

    • SSDEEP

      24576:kyT8dEaIzEzoNE54jigmCwZrIqXPaYbNi6qh9vuO:zitLz0ji58qraRu

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks