General

  • Target

    1c6f844f6ae0b4003c6559d7b36c1c20ab5ebeb35945d4c4b7b2747b91686382

  • Size

    939KB

  • Sample

    231012-df242abf91

  • MD5

    ddde984215a9550b3cc4b4c6a036258b

  • SHA1

    838527773b48a4fd51361bbbfc7f3eff9b4192cb

  • SHA256

    1c6f844f6ae0b4003c6559d7b36c1c20ab5ebeb35945d4c4b7b2747b91686382

  • SHA512

    942383402e02de5da902e33dd5431f1c76e639a62f2c309149fe55191f095fc47ed73b47f89b696f33aa901c2faea463a353b2e1b66fe637b2f492b7be450ed3

  • SSDEEP

    24576:gy0cVwNhHt0nwwtIgIPnoam9jbV7BN6cfEvnJ0RAFQ4Mm/yRkm:n0EwNeIxvlmJbNB8cf6mR2JyR

Malware Config

Extracted

Family

redline

Botnet

tuxiu

C2

77.91.124.82:19071

Attributes
  • auth_value

    29610cdad07e7187eec70685a04b89fe

Targets

    • Target

      1c6f844f6ae0b4003c6559d7b36c1c20ab5ebeb35945d4c4b7b2747b91686382

    • Size

      939KB

    • MD5

      ddde984215a9550b3cc4b4c6a036258b

    • SHA1

      838527773b48a4fd51361bbbfc7f3eff9b4192cb

    • SHA256

      1c6f844f6ae0b4003c6559d7b36c1c20ab5ebeb35945d4c4b7b2747b91686382

    • SHA512

      942383402e02de5da902e33dd5431f1c76e639a62f2c309149fe55191f095fc47ed73b47f89b696f33aa901c2faea463a353b2e1b66fe637b2f492b7be450ed3

    • SSDEEP

      24576:gy0cVwNhHt0nwwtIgIPnoam9jbV7BN6cfEvnJ0RAFQ4Mm/yRkm:n0EwNeIxvlmJbNB8cf6mR2JyR

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks