General

  • Target

    b3a20558cb15d40106825019078e24eb36fbc48426e3dadb38937ad4f7a05b74

  • Size

    928KB

  • Sample

    231011-28pamsbc4v

  • MD5

    1fe3a6c6588cc205e0f745cd266e0152

  • SHA1

    6fbd99ea26eb84c7c2a16e957a65cef3a59d43ff

  • SHA256

    b3a20558cb15d40106825019078e24eb36fbc48426e3dadb38937ad4f7a05b74

  • SHA512

    c8535379d939ce7ef90b306e4aa0476a0e030bfdd51e1737c2b339549ab8c4730738930ea724c0ca1d00dbcb84e47ca4fcc5117790dabdd9915f15bb7382323c

  • SSDEEP

    12288:BMroy90cVguWxanaYyRvgfF5jLqcOsTmH/HXt4jxAmTQw2VuKrUYxFsfg:py3VgRE34gfXic8/Xt4tQw2VRrig

Malware Config

Extracted

Family

redline

Botnet

tuxiu

C2

77.91.124.82:19071

Attributes
  • auth_value

    29610cdad07e7187eec70685a04b89fe

Targets

    • Target

      b3a20558cb15d40106825019078e24eb36fbc48426e3dadb38937ad4f7a05b74

    • Size

      928KB

    • MD5

      1fe3a6c6588cc205e0f745cd266e0152

    • SHA1

      6fbd99ea26eb84c7c2a16e957a65cef3a59d43ff

    • SHA256

      b3a20558cb15d40106825019078e24eb36fbc48426e3dadb38937ad4f7a05b74

    • SHA512

      c8535379d939ce7ef90b306e4aa0476a0e030bfdd51e1737c2b339549ab8c4730738930ea724c0ca1d00dbcb84e47ca4fcc5117790dabdd9915f15bb7382323c

    • SSDEEP

      12288:BMroy90cVguWxanaYyRvgfF5jLqcOsTmH/HXt4jxAmTQw2VuKrUYxFsfg:py3VgRE34gfXic8/Xt4tQw2VRrig

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks