General

  • Target

    x0201647.exe

  • Size

    390KB

  • Sample

    231011-zc1yfsca7x

  • MD5

    d21abaab99e865e5c8e309a84382a268

  • SHA1

    ab794e2cf17b9469374587ad8d0087973f114e97

  • SHA256

    eea8f7467592f1ead9ec19e814ee54b493038989455f94dbf8924f6239aad904

  • SHA512

    e344b9956e7163398085a450fce72a0e07eab7605e3b4921614626071c56ba2b78009eec66211ab5d5e5e5bab2ed31422f06ee09fd3b34c998c5e1c1d47438a6

  • SSDEEP

    6144:KAy+bnr+Fp0yN90QEZcftN3j1sfvbDgdEWtH5k/uRNPHWBJFgYB:wMrVy90cfjyf6E2GuPHWhgs

Malware Config

Extracted

Family

redline

Botnet

tuxiu

C2

77.91.124.82:19071

Attributes
  • auth_value

    29610cdad07e7187eec70685a04b89fe

Targets

    • Target

      x0201647.exe

    • Size

      390KB

    • MD5

      d21abaab99e865e5c8e309a84382a268

    • SHA1

      ab794e2cf17b9469374587ad8d0087973f114e97

    • SHA256

      eea8f7467592f1ead9ec19e814ee54b493038989455f94dbf8924f6239aad904

    • SHA512

      e344b9956e7163398085a450fce72a0e07eab7605e3b4921614626071c56ba2b78009eec66211ab5d5e5e5bab2ed31422f06ee09fd3b34c998c5e1c1d47438a6

    • SSDEEP

      6144:KAy+bnr+Fp0yN90QEZcftN3j1sfvbDgdEWtH5k/uRNPHWBJFgYB:wMrVy90cfjyf6E2GuPHWhgs

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks