General

  • Target

    a4fce5f7c055d39266a982db7c8fe7f0d1105b8ae57bbf312e7570508a8df3ba

  • Size

    282KB

  • Sample

    230607-2jt5lagg56

  • MD5

    ce167c02cf097228347afb02f7b277b4

  • SHA1

    6372e63ebbe30706f27840af8be04db59d4c6155

  • SHA256

    a4fce5f7c055d39266a982db7c8fe7f0d1105b8ae57bbf312e7570508a8df3ba

  • SHA512

    57af3190b74fbdf1b2192f7ced0c7c194261ad6cbd22bc9d4554f0a6af9035bcc94e13f9d57f08a97285dc142a0a8dac14bb4c6a49c98ac0fac864901fc47df2

  • SSDEEP

    6144:fQvoWvJK3Ec8wvTygXUNVS4MGh1aBFrvz1xcxcWhortl:fUc0qyR1aBFrvz1xcxdortl

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      a4fce5f7c055d39266a982db7c8fe7f0d1105b8ae57bbf312e7570508a8df3ba

    • Size

      282KB

    • MD5

      ce167c02cf097228347afb02f7b277b4

    • SHA1

      6372e63ebbe30706f27840af8be04db59d4c6155

    • SHA256

      a4fce5f7c055d39266a982db7c8fe7f0d1105b8ae57bbf312e7570508a8df3ba

    • SHA512

      57af3190b74fbdf1b2192f7ced0c7c194261ad6cbd22bc9d4554f0a6af9035bcc94e13f9d57f08a97285dc142a0a8dac14bb4c6a49c98ac0fac864901fc47df2

    • SSDEEP

      6144:fQvoWvJK3Ec8wvTygXUNVS4MGh1aBFrvz1xcxcWhortl:fUc0qyR1aBFrvz1xcxdortl

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks