General

  • Target

    1b7d67a9d88b441a5be52dcabc8991e2c8e9fbb0d2cb648efc12d4cf77215e12

  • Size

    261KB

  • Sample

    230607-r7bytabh33

  • MD5

    8d71c38af11b75673b1c46131967aa48

  • SHA1

    205054e944d7057529c6045a3bce71cd650700ac

  • SHA256

    1b7d67a9d88b441a5be52dcabc8991e2c8e9fbb0d2cb648efc12d4cf77215e12

  • SHA512

    2b1b0877d848d4e136bf14c62eab0105732997c6719975b4c1e927d71aecb11dd21b9fd03c4b19190ddba951342aa26d8899870e8f51657e79cec0a5f3583298

  • SSDEEP

    3072:1hg7I11vuJRyHFaQ7RQ05CTEezbClXv8r8+oFe6gobFHFzA+E+2yQHcj/:zgc11bFaQ7W05AEezbMPZFzAy2yA

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      1b7d67a9d88b441a5be52dcabc8991e2c8e9fbb0d2cb648efc12d4cf77215e12

    • Size

      261KB

    • MD5

      8d71c38af11b75673b1c46131967aa48

    • SHA1

      205054e944d7057529c6045a3bce71cd650700ac

    • SHA256

      1b7d67a9d88b441a5be52dcabc8991e2c8e9fbb0d2cb648efc12d4cf77215e12

    • SHA512

      2b1b0877d848d4e136bf14c62eab0105732997c6719975b4c1e927d71aecb11dd21b9fd03c4b19190ddba951342aa26d8899870e8f51657e79cec0a5f3583298

    • SSDEEP

      3072:1hg7I11vuJRyHFaQ7RQ05CTEezbClXv8r8+oFe6gobFHFzA+E+2yQHcj/:zgc11bFaQ7W05AEezbMPZFzAy2yA

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks