General

  • Target

    bbeeb2024b7fb745a13e1ff05b087ac85150cee3382ac05aece41918451d5d48

  • Size

    1.2MB

  • Sample

    231009-zcd4pagb7t

  • MD5

    b9b045ed22ff21d906ab6f2c21220980

  • SHA1

    12a8d69da35b8830cf8724ff2f963397f765d404

  • SHA256

    bbeeb2024b7fb745a13e1ff05b087ac85150cee3382ac05aece41918451d5d48

  • SHA512

    969f830773242bb6798cab393925251475d8f557be3ddb34ebd9f57087774bc9d79fcf3a4730857cbd0ad6417eefd9b32978579cdd8c123d923295b4a5894c9f

  • SSDEEP

    24576:OyX6nyC+IgCvYArGPDMCXtpYVg315d7/mYxMicCMW7WD:dKypjHBPgCXDYVg3E7icY7

Malware Config

Extracted

Family

redline

Botnet

lutyr

C2

77.91.124.55:19071

Targets

    • Target

      bbeeb2024b7fb745a13e1ff05b087ac85150cee3382ac05aece41918451d5d48

    • Size

      1.2MB

    • MD5

      b9b045ed22ff21d906ab6f2c21220980

    • SHA1

      12a8d69da35b8830cf8724ff2f963397f765d404

    • SHA256

      bbeeb2024b7fb745a13e1ff05b087ac85150cee3382ac05aece41918451d5d48

    • SHA512

      969f830773242bb6798cab393925251475d8f557be3ddb34ebd9f57087774bc9d79fcf3a4730857cbd0ad6417eefd9b32978579cdd8c123d923295b4a5894c9f

    • SSDEEP

      24576:OyX6nyC+IgCvYArGPDMCXtpYVg315d7/mYxMicCMW7WD:dKypjHBPgCXDYVg3E7icY7

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks