General

  • Target

    2e1c01f2856091e93d5160552c74dfae3bd890e1a8dc35267f0ded5e315bcceb

  • Size

    696KB

  • Sample

    231012-h8eawsdf9t

  • MD5

    ec9bc1b37f31dad9845219240380405c

  • SHA1

    c304d37ee514882de10115b9a519ccb892d14a3b

  • SHA256

    2e1c01f2856091e93d5160552c74dfae3bd890e1a8dc35267f0ded5e315bcceb

  • SHA512

    5598173fa7da00a348a0298949cd190e4a95c5d0636b2ac30aac0d5156fda7f760c94d96980a4af3209b7a0a30c5dee7a1d6b644b1dcbe8756393b21669c7df3

  • SSDEEP

    12288:NMrDy90QjTS/tVrEGJtQP10O+q8gnfNFdb3BTGYBeQr7OV:GyrO/XQoiP10f2fHdJ/Bvo

Malware Config

Extracted

Family

redline

Botnet

tuxiu

C2

77.91.124.82:19071

Attributes
  • auth_value

    29610cdad07e7187eec70685a04b89fe

Targets

    • Target

      2e1c01f2856091e93d5160552c74dfae3bd890e1a8dc35267f0ded5e315bcceb

    • Size

      696KB

    • MD5

      ec9bc1b37f31dad9845219240380405c

    • SHA1

      c304d37ee514882de10115b9a519ccb892d14a3b

    • SHA256

      2e1c01f2856091e93d5160552c74dfae3bd890e1a8dc35267f0ded5e315bcceb

    • SHA512

      5598173fa7da00a348a0298949cd190e4a95c5d0636b2ac30aac0d5156fda7f760c94d96980a4af3209b7a0a30c5dee7a1d6b644b1dcbe8756393b21669c7df3

    • SSDEEP

      12288:NMrDy90QjTS/tVrEGJtQP10O+q8gnfNFdb3BTGYBeQr7OV:GyrO/XQoiP10f2fHdJ/Bvo

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks