General

  • Target

    d2e9bace5f5a007a3bb3a42b6e8b4ee35e75bfd37d08e2de9246f1de2435cb27

  • Size

    1.0MB

  • Sample

    231012-gvrtdsbe3v

  • MD5

    7f2e31c427160633de948a131dcf7d54

  • SHA1

    a92a03041246b27ad0f7148fcd389a1775580038

  • SHA256

    d2e9bace5f5a007a3bb3a42b6e8b4ee35e75bfd37d08e2de9246f1de2435cb27

  • SHA512

    6f9c5729e23a174ab9b4b7fad335cf4a7fa4e851dbd7469a8626f0c911897b497c2d0bd2b131efaa5fe3810a15ab76b0b2add52f71ae6ea44b0a4662e76e64d6

  • SSDEEP

    24576:FypgyxopsRoqlBAVEeuh0CoZW8fFy1SFtaizDIs:gJxopOoIBEEL7oV8SJ

Malware Config

Extracted

Family

redline

Botnet

tuxiu

C2

77.91.124.82:19071

Attributes
  • auth_value

    29610cdad07e7187eec70685a04b89fe

Targets

    • Target

      d2e9bace5f5a007a3bb3a42b6e8b4ee35e75bfd37d08e2de9246f1de2435cb27

    • Size

      1.0MB

    • MD5

      7f2e31c427160633de948a131dcf7d54

    • SHA1

      a92a03041246b27ad0f7148fcd389a1775580038

    • SHA256

      d2e9bace5f5a007a3bb3a42b6e8b4ee35e75bfd37d08e2de9246f1de2435cb27

    • SHA512

      6f9c5729e23a174ab9b4b7fad335cf4a7fa4e851dbd7469a8626f0c911897b497c2d0bd2b131efaa5fe3810a15ab76b0b2add52f71ae6ea44b0a4662e76e64d6

    • SSDEEP

      24576:FypgyxopsRoqlBAVEeuh0CoZW8fFy1SFtaizDIs:gJxopOoIBEEL7oV8SJ

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks