General

  • Target

    920695d680e47eccb720bb2baf72700a1918b94fcb4a20e13c66278798a088e9

  • Size

    262KB

  • Sample

    230607-phjk9aac62

  • MD5

    4f5d8574b58278324445a48b7492431c

  • SHA1

    21c29ece4c9a2495f9543149d9fc26e190f34315

  • SHA256

    920695d680e47eccb720bb2baf72700a1918b94fcb4a20e13c66278798a088e9

  • SHA512

    00ca6438f99de30d7c7ac66e9607c19376c452b8d5bf1158d6dce109d0d50909d4d234c444806ddf2105a7d00ab30c12fa79c3ebe83e694287af815d16bd69a7

  • SSDEEP

    3072:3x/Q1dYeyVyXFaQ7RQ05CTEezbClXv8r8+oFe6gobFHFzA+E+2SUHcj/:h/Q1CAFaQ7W05AEezbMPZFzAy2Sc

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      920695d680e47eccb720bb2baf72700a1918b94fcb4a20e13c66278798a088e9

    • Size

      262KB

    • MD5

      4f5d8574b58278324445a48b7492431c

    • SHA1

      21c29ece4c9a2495f9543149d9fc26e190f34315

    • SHA256

      920695d680e47eccb720bb2baf72700a1918b94fcb4a20e13c66278798a088e9

    • SHA512

      00ca6438f99de30d7c7ac66e9607c19376c452b8d5bf1158d6dce109d0d50909d4d234c444806ddf2105a7d00ab30c12fa79c3ebe83e694287af815d16bd69a7

    • SSDEEP

      3072:3x/Q1dYeyVyXFaQ7RQ05CTEezbClXv8r8+oFe6gobFHFzA+E+2SUHcj/:h/Q1CAFaQ7W05AEezbMPZFzAy2Sc

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks