General

  • Target

    e99f1c5fe15089afa2e41ca1e708c37bd53949a30bb1b46ed0e8a9832e5c5226

  • Size

    956KB

  • Sample

    231011-2l6amshd7v

  • MD5

    0d2761a36d1458ca8aaa64c01a6e267d

  • SHA1

    013ad847fcad051ac441fd2522ba81f5c1f53a4e

  • SHA256

    e99f1c5fe15089afa2e41ca1e708c37bd53949a30bb1b46ed0e8a9832e5c5226

  • SHA512

    7ff8786cda73d507943c2be2877f064ecc3994c681432e63c9cb53af1bb5067d104e3a5019a7622ebb6f9d3f447a43d692168341fc370fc19fd23286d2f52dc0

  • SSDEEP

    24576:WyWD41YyztehJ4pf7D+gIjhdeueoqBfP3gGGBp:l7IhJ417D+gIjThefw

Malware Config

Extracted

Family

redline

Botnet

tuxiu

C2

77.91.124.82:19071

Attributes
  • auth_value

    29610cdad07e7187eec70685a04b89fe

Targets

    • Target

      e99f1c5fe15089afa2e41ca1e708c37bd53949a30bb1b46ed0e8a9832e5c5226

    • Size

      956KB

    • MD5

      0d2761a36d1458ca8aaa64c01a6e267d

    • SHA1

      013ad847fcad051ac441fd2522ba81f5c1f53a4e

    • SHA256

      e99f1c5fe15089afa2e41ca1e708c37bd53949a30bb1b46ed0e8a9832e5c5226

    • SHA512

      7ff8786cda73d507943c2be2877f064ecc3994c681432e63c9cb53af1bb5067d104e3a5019a7622ebb6f9d3f447a43d692168341fc370fc19fd23286d2f52dc0

    • SSDEEP

      24576:WyWD41YyztehJ4pf7D+gIjhdeueoqBfP3gGGBp:l7IhJ417D+gIjThefw

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks