General

  • Target

    083597c6d990c1c7e59da8612a2072a9e7e01a10f4c8fc569565241777ef5029

  • Size

    954KB

  • Sample

    231011-1agmgaea7x

  • MD5

    39dc08b0f43bf5446344aef849e1796f

  • SHA1

    0403612818b2fa92d0ef66a0b82addfe841f6832

  • SHA256

    083597c6d990c1c7e59da8612a2072a9e7e01a10f4c8fc569565241777ef5029

  • SHA512

    c8fa9a940ed47becdafeb498e69c5375196e45338cb4f65d9b528b417a80a86f305394d4b8b41dd8b9cfaea084ee05090bfa0ec68cab52425bc841e61154a4fc

  • SSDEEP

    12288:YMrhy90WRhjyxm2rF4l43sKTtZzabfJwE1BgOlMg7wlw7lZ9hXWDQa79XPbBedyE:Zyj90au3hdCwsmOl7war9hXva75PbxE

Malware Config

Extracted

Family

redline

Botnet

tuxiu

C2

77.91.124.82:19071

Attributes
  • auth_value

    29610cdad07e7187eec70685a04b89fe

Targets

    • Target

      083597c6d990c1c7e59da8612a2072a9e7e01a10f4c8fc569565241777ef5029

    • Size

      954KB

    • MD5

      39dc08b0f43bf5446344aef849e1796f

    • SHA1

      0403612818b2fa92d0ef66a0b82addfe841f6832

    • SHA256

      083597c6d990c1c7e59da8612a2072a9e7e01a10f4c8fc569565241777ef5029

    • SHA512

      c8fa9a940ed47becdafeb498e69c5375196e45338cb4f65d9b528b417a80a86f305394d4b8b41dd8b9cfaea084ee05090bfa0ec68cab52425bc841e61154a4fc

    • SSDEEP

      12288:YMrhy90WRhjyxm2rF4l43sKTtZzabfJwE1BgOlMg7wlw7lZ9hXWDQa79XPbBedyE:Zyj90au3hdCwsmOl7war9hXva75PbxE

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks