General

  • Target

    15d1593af9e800efa21dd4ec84591f011a16979193d141fde7f18f2b3009a0e3

  • Size

    1.0MB

  • Sample

    231012-gtatgsbd5v

  • MD5

    b3dc4b3a0068196cd3fb54addec4d58f

  • SHA1

    007b08c1b5f0d90b12c1b53b842e69e939195584

  • SHA256

    15d1593af9e800efa21dd4ec84591f011a16979193d141fde7f18f2b3009a0e3

  • SHA512

    16e672d52e3f4386d79e7072d60e1928d1cd1948b2d00e80259b20838ff94d5841ef305abadcdcbb11e7970c99dc98b24e43d49c3275aca8d36e95eeba01562b

  • SSDEEP

    24576:5ygcOHGYVXSFtJnvAmXP9pzo8R2Ued17TBdUG+fl8z/I:sgJEBBXzoI2Uedxv2

Malware Config

Extracted

Family

redline

Botnet

tuxiu

C2

77.91.124.82:19071

Attributes
  • auth_value

    29610cdad07e7187eec70685a04b89fe

Targets

    • Target

      15d1593af9e800efa21dd4ec84591f011a16979193d141fde7f18f2b3009a0e3

    • Size

      1.0MB

    • MD5

      b3dc4b3a0068196cd3fb54addec4d58f

    • SHA1

      007b08c1b5f0d90b12c1b53b842e69e939195584

    • SHA256

      15d1593af9e800efa21dd4ec84591f011a16979193d141fde7f18f2b3009a0e3

    • SHA512

      16e672d52e3f4386d79e7072d60e1928d1cd1948b2d00e80259b20838ff94d5841ef305abadcdcbb11e7970c99dc98b24e43d49c3275aca8d36e95eeba01562b

    • SSDEEP

      24576:5ygcOHGYVXSFtJnvAmXP9pzo8R2Ued17TBdUG+fl8z/I:sgJEBBXzoI2Uedxv2

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks