General

  • Target

    9b58b179a37e1b3de9c4d21e84bb54ef8cedc196d9d60354ddb10de9afc5802d

  • Size

    282KB

  • Sample

    230607-2fkfzshc2s

  • MD5

    92fe84508492cfbf1a6c38ec854c73eb

  • SHA1

    742c6bc1956aac65caff46782d59b42ceca8d7cd

  • SHA256

    9b58b179a37e1b3de9c4d21e84bb54ef8cedc196d9d60354ddb10de9afc5802d

  • SHA512

    db49867e0ed81bea498d75189548070f6cb2549e947f2cf3091b7af8f805cce5228cee1583781fbb0738bd1fa656c80354a7caa758b59a5db927b4532b2b59f4

  • SSDEEP

    6144:zQvoWvJnlEMwvTygXUNVS4MGh1aBFrvz1xcxcWhZrt:zUjmyR1aBFrvz1xcxdZrt

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      9b58b179a37e1b3de9c4d21e84bb54ef8cedc196d9d60354ddb10de9afc5802d

    • Size

      282KB

    • MD5

      92fe84508492cfbf1a6c38ec854c73eb

    • SHA1

      742c6bc1956aac65caff46782d59b42ceca8d7cd

    • SHA256

      9b58b179a37e1b3de9c4d21e84bb54ef8cedc196d9d60354ddb10de9afc5802d

    • SHA512

      db49867e0ed81bea498d75189548070f6cb2549e947f2cf3091b7af8f805cce5228cee1583781fbb0738bd1fa656c80354a7caa758b59a5db927b4532b2b59f4

    • SSDEEP

      6144:zQvoWvJnlEMwvTygXUNVS4MGh1aBFrvz1xcxcWhZrt:zUjmyR1aBFrvz1xcxdZrt

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks