General

  • Target

    27ebe99f7c9cf1ae149018265de12c81a0c6061fe9b5c8793b7371489a88aad5

  • Size

    262KB

  • Sample

    230607-q5b1csbc59

  • MD5

    3afc92605219af54057214e4a12a3d19

  • SHA1

    839c3f3b5b08dc712ac119be790d1555ee7ad70f

  • SHA256

    27ebe99f7c9cf1ae149018265de12c81a0c6061fe9b5c8793b7371489a88aad5

  • SHA512

    ea875654b89aa13a32f17a0ca2b1bbafb02311f82267cfcbb86b86dc519989d792c61da6964182fbb001fd13d1adf1a7524ebd20de96262762409d4dfe2c5d30

  • SSDEEP

    3072:Ox/qx1OuyRyXFaQ7RQ05CTEezbClXv8r8+oFe6gobFHFzA+E+2SUHcj/:a/qx1aEFaQ7W05AEezbMPZFzAy2Sc

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      27ebe99f7c9cf1ae149018265de12c81a0c6061fe9b5c8793b7371489a88aad5

    • Size

      262KB

    • MD5

      3afc92605219af54057214e4a12a3d19

    • SHA1

      839c3f3b5b08dc712ac119be790d1555ee7ad70f

    • SHA256

      27ebe99f7c9cf1ae149018265de12c81a0c6061fe9b5c8793b7371489a88aad5

    • SHA512

      ea875654b89aa13a32f17a0ca2b1bbafb02311f82267cfcbb86b86dc519989d792c61da6964182fbb001fd13d1adf1a7524ebd20de96262762409d4dfe2c5d30

    • SSDEEP

      3072:Ox/qx1OuyRyXFaQ7RQ05CTEezbClXv8r8+oFe6gobFHFzA+E+2SUHcj/:a/qx1aEFaQ7W05AEezbMPZFzAy2Sc

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks