General

  • Target

    43c2dc4d1595eae803346e406606bca2dac820fda89af1917d7762fb66cb2453

  • Size

    956KB

  • Sample

    231011-2rfl6sbh28

  • MD5

    bc553eff5b4b8567f6691b3f345e890b

  • SHA1

    f3dfb7d6a0689549b9d924ec1972f79c49b9a96c

  • SHA256

    43c2dc4d1595eae803346e406606bca2dac820fda89af1917d7762fb66cb2453

  • SHA512

    99019020e34df2ee3b7fc32cdd4db53e8eda933d653d2a02933bb52bf1627a63be789abe914159331d41eb6e14b83286aac4ac9de2c1fddef1073cafc617186b

  • SSDEEP

    24576:KyolDkDv+9yI4KGT6QImxABsPh1xS0vWQwaOAIPfMS:RYkYyIFwR1TxBE

Malware Config

Extracted

Family

redline

Botnet

tuxiu

C2

77.91.124.82:19071

Attributes
  • auth_value

    29610cdad07e7187eec70685a04b89fe

Targets

    • Target

      43c2dc4d1595eae803346e406606bca2dac820fda89af1917d7762fb66cb2453

    • Size

      956KB

    • MD5

      bc553eff5b4b8567f6691b3f345e890b

    • SHA1

      f3dfb7d6a0689549b9d924ec1972f79c49b9a96c

    • SHA256

      43c2dc4d1595eae803346e406606bca2dac820fda89af1917d7762fb66cb2453

    • SHA512

      99019020e34df2ee3b7fc32cdd4db53e8eda933d653d2a02933bb52bf1627a63be789abe914159331d41eb6e14b83286aac4ac9de2c1fddef1073cafc617186b

    • SSDEEP

      24576:KyolDkDv+9yI4KGT6QImxABsPh1xS0vWQwaOAIPfMS:RYkYyIFwR1TxBE

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks