General

  • Target

    ffc70c08935cbefa1adbf1b7f5784586cc67648f9f7b49d1c2e81c5657b78bd6

  • Size

    282KB

  • Sample

    230607-3y4s1shd79

  • MD5

    86f357bb2281536f7d1861a6ad5a057b

  • SHA1

    7c4f580b18da8a10565ca5ab45e07d3e8ffb045d

  • SHA256

    ffc70c08935cbefa1adbf1b7f5784586cc67648f9f7b49d1c2e81c5657b78bd6

  • SHA512

    5275e76d1390015601461e1c471571824c30e721b43af7e0ed8b912fd50b9f8006c894c6abcb6ced6e3e2c0050098a6cafae0e35cabbfad50c6988c49eb8e95e

  • SSDEEP

    6144:tQvoWvJfCtUWwvTygXUNVS4MGh1aBFrvz1xcxcWhNrt:tUokyR1aBFrvz1xcxdNrt

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      ffc70c08935cbefa1adbf1b7f5784586cc67648f9f7b49d1c2e81c5657b78bd6

    • Size

      282KB

    • MD5

      86f357bb2281536f7d1861a6ad5a057b

    • SHA1

      7c4f580b18da8a10565ca5ab45e07d3e8ffb045d

    • SHA256

      ffc70c08935cbefa1adbf1b7f5784586cc67648f9f7b49d1c2e81c5657b78bd6

    • SHA512

      5275e76d1390015601461e1c471571824c30e721b43af7e0ed8b912fd50b9f8006c894c6abcb6ced6e3e2c0050098a6cafae0e35cabbfad50c6988c49eb8e95e

    • SSDEEP

      6144:tQvoWvJfCtUWwvTygXUNVS4MGh1aBFrvz1xcxcWhNrt:tUokyR1aBFrvz1xcxdNrt

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks