General

  • Target

    67cd9271b2ddee46bb14266485700c64f4ad53fced2bbfbd8da3156cf0eaabcb

  • Size

    928KB

  • Sample

    231012-a2x6esdg7y

  • MD5

    23ea068f60954b33467962de413079e0

  • SHA1

    47bc751479909d1dae2c9abfbc6fc85dd5d4a878

  • SHA256

    67cd9271b2ddee46bb14266485700c64f4ad53fced2bbfbd8da3156cf0eaabcb

  • SHA512

    d5e6ada3923de0aa15c97009afee52440a70d872864ab16421d7de5a0d25bae9e6b63d86c402a7e6ca4014cec8efdf98eced6ede7a978108998fa9e94a85846a

  • SSDEEP

    24576:+yVCHaWpTlEu0DL6j9CrYwm5hf8uwbe9AowN:NVrWpTOui49CzQhfr9A

Malware Config

Extracted

Family

redline

Botnet

tuxiu

C2

77.91.124.82:19071

Attributes
  • auth_value

    29610cdad07e7187eec70685a04b89fe

Targets

    • Target

      67cd9271b2ddee46bb14266485700c64f4ad53fced2bbfbd8da3156cf0eaabcb

    • Size

      928KB

    • MD5

      23ea068f60954b33467962de413079e0

    • SHA1

      47bc751479909d1dae2c9abfbc6fc85dd5d4a878

    • SHA256

      67cd9271b2ddee46bb14266485700c64f4ad53fced2bbfbd8da3156cf0eaabcb

    • SHA512

      d5e6ada3923de0aa15c97009afee52440a70d872864ab16421d7de5a0d25bae9e6b63d86c402a7e6ca4014cec8efdf98eced6ede7a978108998fa9e94a85846a

    • SSDEEP

      24576:+yVCHaWpTlEu0DL6j9CrYwm5hf8uwbe9AowN:NVrWpTOui49CzQhfr9A

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks