General

  • Target

    33969833c5e7e82315b753a762e8ca4ec8723ed831908585d4e0a8b237a61053

  • Size

    928KB

  • Sample

    231011-27rdlsdc74

  • MD5

    a5c332dbfd0d2552b8d142d5e17a754e

  • SHA1

    e29247c0e93386fc83f26bd8b6e23c73f9bf6265

  • SHA256

    33969833c5e7e82315b753a762e8ca4ec8723ed831908585d4e0a8b237a61053

  • SHA512

    ec83a9e4953bcd7bf4c4445eacf8da47e412cdcd1af48589668a82e3516a032392f101c021be29227ef97790cc3ad829baefc411b3ec934ef1d8f439bcf03126

  • SSDEEP

    24576:3yKirsX6/LR5ymM76gvzS1L6aPO4SHmHQW:CxrsK/jgHS8pzG

Malware Config

Extracted

Family

redline

Botnet

tuxiu

C2

77.91.124.82:19071

Attributes
  • auth_value

    29610cdad07e7187eec70685a04b89fe

Targets

    • Target

      33969833c5e7e82315b753a762e8ca4ec8723ed831908585d4e0a8b237a61053

    • Size

      928KB

    • MD5

      a5c332dbfd0d2552b8d142d5e17a754e

    • SHA1

      e29247c0e93386fc83f26bd8b6e23c73f9bf6265

    • SHA256

      33969833c5e7e82315b753a762e8ca4ec8723ed831908585d4e0a8b237a61053

    • SHA512

      ec83a9e4953bcd7bf4c4445eacf8da47e412cdcd1af48589668a82e3516a032392f101c021be29227ef97790cc3ad829baefc411b3ec934ef1d8f439bcf03126

    • SSDEEP

      24576:3yKirsX6/LR5ymM76gvzS1L6aPO4SHmHQW:CxrsK/jgHS8pzG

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks