General

  • Target

    3fa59b3313f661a0ea99ba80da071cd13c58c98ac08e6ee15ef0c90552e8077f

  • Size

    1.0MB

  • Sample

    231012-fj517sad68

  • MD5

    141baf6bdc0afbfc0fcc1ef4b47552ec

  • SHA1

    90c5dc33c0c9161955f63853039722b00eb220b7

  • SHA256

    3fa59b3313f661a0ea99ba80da071cd13c58c98ac08e6ee15ef0c90552e8077f

  • SHA512

    d4c3cff158a592873b44e469a22ecd09d3d9086fcb23c1f538b78f2c233706030697e6b228dd45567b17147c3c625c5de6a3a0fc91bf43403a2770cfc3a202b4

  • SSDEEP

    24576:ZyVHIFedNm+qqgLvxCqXuYf2Gfm+X7qDBMUCe3i5NypURnLzbC:MVoFcUG4CqXtpX7i9bSiYnLz

Malware Config

Extracted

Family

redline

Botnet

tuxiu

C2

77.91.124.82:19071

Attributes
  • auth_value

    29610cdad07e7187eec70685a04b89fe

Targets

    • Target

      3fa59b3313f661a0ea99ba80da071cd13c58c98ac08e6ee15ef0c90552e8077f

    • Size

      1.0MB

    • MD5

      141baf6bdc0afbfc0fcc1ef4b47552ec

    • SHA1

      90c5dc33c0c9161955f63853039722b00eb220b7

    • SHA256

      3fa59b3313f661a0ea99ba80da071cd13c58c98ac08e6ee15ef0c90552e8077f

    • SHA512

      d4c3cff158a592873b44e469a22ecd09d3d9086fcb23c1f538b78f2c233706030697e6b228dd45567b17147c3c625c5de6a3a0fc91bf43403a2770cfc3a202b4

    • SSDEEP

      24576:ZyVHIFedNm+qqgLvxCqXuYf2Gfm+X7qDBMUCe3i5NypURnLzbC:MVoFcUG4CqXtpX7i9bSiYnLz

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks