General

  • Target

    23e62e4fae5dae34e3d0a51e62e232c7c08e438f3cf769bcf2c362c553287bb6

  • Size

    956KB

  • Sample

    231012-etdt2aeb8v

  • MD5

    31fd8e589dfe54ad536aaca731464837

  • SHA1

    0672bbd5423629166ec10af4a6146743853eb50f

  • SHA256

    23e62e4fae5dae34e3d0a51e62e232c7c08e438f3cf769bcf2c362c553287bb6

  • SHA512

    89721332708e9801dfda6faf69a230b5ece5cc15a48d573fc7589efe04844f0d41806c3172b2dfcd1ea3645a09e89855e8346745310f938a057704ecc626224f

  • SSDEEP

    24576:gyuTPbU+tkm/RSLsEkPBVOi4rpT94ZTl95E2Wq:naUw9RSTkLcrdKR5ET

Malware Config

Extracted

Family

redline

Botnet

tuxiu

C2

77.91.124.82:19071

Attributes
  • auth_value

    29610cdad07e7187eec70685a04b89fe

Targets

    • Target

      23e62e4fae5dae34e3d0a51e62e232c7c08e438f3cf769bcf2c362c553287bb6

    • Size

      956KB

    • MD5

      31fd8e589dfe54ad536aaca731464837

    • SHA1

      0672bbd5423629166ec10af4a6146743853eb50f

    • SHA256

      23e62e4fae5dae34e3d0a51e62e232c7c08e438f3cf769bcf2c362c553287bb6

    • SHA512

      89721332708e9801dfda6faf69a230b5ece5cc15a48d573fc7589efe04844f0d41806c3172b2dfcd1ea3645a09e89855e8346745310f938a057704ecc626224f

    • SSDEEP

      24576:gyuTPbU+tkm/RSLsEkPBVOi4rpT94ZTl95E2Wq:naUw9RSTkLcrdKR5ET

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks