General

  • Target

    b0b8fa33232207e40d005405351e6ab47ca2fb2b1368a564910ed491e73c0d5e

  • Size

    261KB

  • Sample

    230607-s1tqqacc69

  • MD5

    7ba323301ce815e37b27a92a79f113a2

  • SHA1

    44b9e275e801bda5ef524e450369a323d7e400e8

  • SHA256

    b0b8fa33232207e40d005405351e6ab47ca2fb2b1368a564910ed491e73c0d5e

  • SHA512

    b0ae85a26010b4208014575b695c20997cb72b928c47766667eea1aa691b3418e0652b74e052116dc78042c195b31414ce639107a83faf2c2e0849fa3697397f

  • SSDEEP

    3072:vhg701Xi+5RyHFaQ7RQ05CTEezbClXv8r8+oFe6gobFHFzA+E+2yQHcj/:pgA1XaFaQ7W05AEezbMPZFzAy2yA

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      b0b8fa33232207e40d005405351e6ab47ca2fb2b1368a564910ed491e73c0d5e

    • Size

      261KB

    • MD5

      7ba323301ce815e37b27a92a79f113a2

    • SHA1

      44b9e275e801bda5ef524e450369a323d7e400e8

    • SHA256

      b0b8fa33232207e40d005405351e6ab47ca2fb2b1368a564910ed491e73c0d5e

    • SHA512

      b0ae85a26010b4208014575b695c20997cb72b928c47766667eea1aa691b3418e0652b74e052116dc78042c195b31414ce639107a83faf2c2e0849fa3697397f

    • SSDEEP

      3072:vhg701Xi+5RyHFaQ7RQ05CTEezbClXv8r8+oFe6gobFHFzA+E+2yQHcj/:pgA1XaFaQ7W05AEezbMPZFzAy2yA

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks