General

  • Target

    4be36b30e26772e5934e8913d87b444720f91c35bb9d8a44728b1b60d8db0a24

  • Size

    928KB

  • Sample

    231012-a4r27aga74

  • MD5

    3069208dc66e2ab0646514ddcb0b2fdc

  • SHA1

    8e25137af99717b7b17237b79167a3b927118109

  • SHA256

    4be36b30e26772e5934e8913d87b444720f91c35bb9d8a44728b1b60d8db0a24

  • SHA512

    45c0fb11a4bdbc98b22a1421635d6a0d2ba382a75d7c4163f33f0936a70c3e0ee4b0ff17cb755540f5c9e992035369fbf54a7429f614ac473eb8d16362de4723

  • SSDEEP

    24576:nytmFWFeIw3zj1+9Z3L4XrkR/AaRZrT2sCY:ygFWFeIaFolLeI/VTrT2h

Malware Config

Extracted

Family

redline

Botnet

tuxiu

C2

77.91.124.82:19071

Attributes
  • auth_value

    29610cdad07e7187eec70685a04b89fe

Targets

    • Target

      4be36b30e26772e5934e8913d87b444720f91c35bb9d8a44728b1b60d8db0a24

    • Size

      928KB

    • MD5

      3069208dc66e2ab0646514ddcb0b2fdc

    • SHA1

      8e25137af99717b7b17237b79167a3b927118109

    • SHA256

      4be36b30e26772e5934e8913d87b444720f91c35bb9d8a44728b1b60d8db0a24

    • SHA512

      45c0fb11a4bdbc98b22a1421635d6a0d2ba382a75d7c4163f33f0936a70c3e0ee4b0ff17cb755540f5c9e992035369fbf54a7429f614ac473eb8d16362de4723

    • SSDEEP

      24576:nytmFWFeIw3zj1+9Z3L4XrkR/AaRZrT2sCY:ygFWFeIaFolLeI/VTrT2h

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks