General

  • Target

    f7030faf024ac0666117bbf28db8ab9911bbc6eda8d694a3bda511264abd5e26

  • Size

    1.2MB

  • Sample

    231016-tx9s7sad4x

  • MD5

    dce2cb47547258e28d891101be8946a3

  • SHA1

    509a8719d6ad5b57ea132cf9674da31a52a2be3f

  • SHA256

    f7030faf024ac0666117bbf28db8ab9911bbc6eda8d694a3bda511264abd5e26

  • SHA512

    4e77e94c858ca56c2567b0d734454d6a729d9a19b0ef9f8b1acc18b2397813a5ae0d52fdf9b32a4b7a1cb6deddbd4691ad202559ec19b74485153afb28ad7da6

  • SSDEEP

    24576:ey+FVSt4PXSRzSEPWiMG0ydgkoz9tBdKhD/Oha2OEEs:t+TSD2BiZH4tBzhpg

Malware Config

Extracted

Family

redline

Botnet

kukish

C2

77.91.124.55:19071

Targets

    • Target

      f7030faf024ac0666117bbf28db8ab9911bbc6eda8d694a3bda511264abd5e26

    • Size

      1.2MB

    • MD5

      dce2cb47547258e28d891101be8946a3

    • SHA1

      509a8719d6ad5b57ea132cf9674da31a52a2be3f

    • SHA256

      f7030faf024ac0666117bbf28db8ab9911bbc6eda8d694a3bda511264abd5e26

    • SHA512

      4e77e94c858ca56c2567b0d734454d6a729d9a19b0ef9f8b1acc18b2397813a5ae0d52fdf9b32a4b7a1cb6deddbd4691ad202559ec19b74485153afb28ad7da6

    • SSDEEP

      24576:ey+FVSt4PXSRzSEPWiMG0ydgkoz9tBdKhD/Oha2OEEs:t+TSD2BiZH4tBzhpg

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks