General

  • Target

    e3032fb7c20b5a6a724b2b2586965d05d804dfe15737197cc34a9466d87f4331

  • Size

    262KB

  • Sample

    230607-q3mn3sbc29

  • MD5

    b4c1712e349f7a27ddfaf04903689a5d

  • SHA1

    73e6e912f16fa055f2c2dc3c24eacb6e5579a387

  • SHA256

    e3032fb7c20b5a6a724b2b2586965d05d804dfe15737197cc34a9466d87f4331

  • SHA512

    1892ffc637482fff072887bde70f017a3f6c54ff63e287f2ae7e2bc4e3ac1ca037a52009b7125f8544b9d18b15dd97c342ebf300c5b4ee71b02a93e34d6ff155

  • SSDEEP

    3072:Ox/qx1OuyRyXFaQ7RQ05CTEezbClXv8r8+oFe6gobFHFzA+E+2SUHcj/:a/qx1aEFaQ7W05AEezbMPZFzAy2Sc

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      e3032fb7c20b5a6a724b2b2586965d05d804dfe15737197cc34a9466d87f4331

    • Size

      262KB

    • MD5

      b4c1712e349f7a27ddfaf04903689a5d

    • SHA1

      73e6e912f16fa055f2c2dc3c24eacb6e5579a387

    • SHA256

      e3032fb7c20b5a6a724b2b2586965d05d804dfe15737197cc34a9466d87f4331

    • SHA512

      1892ffc637482fff072887bde70f017a3f6c54ff63e287f2ae7e2bc4e3ac1ca037a52009b7125f8544b9d18b15dd97c342ebf300c5b4ee71b02a93e34d6ff155

    • SSDEEP

      3072:Ox/qx1OuyRyXFaQ7RQ05CTEezbClXv8r8+oFe6gobFHFzA+E+2SUHcj/:a/qx1aEFaQ7W05AEezbMPZFzAy2Sc

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks