General

  • Target

    19f077c8bef0103bf45481f1c00e324dc70ac92c8168748531fc966608c4d949

  • Size

    261KB

  • Sample

    230607-szpelsch5t

  • MD5

    1193b2ef04927456bbe196b92083e08b

  • SHA1

    d47e91bf715e9b18c399a18198db7b78bf25d138

  • SHA256

    19f077c8bef0103bf45481f1c00e324dc70ac92c8168748531fc966608c4d949

  • SHA512

    a51a68c98404f98171fb682068eb95278ab125e8c5ce9e9e4b7ed6af9b410863820fb63f56b4003d8b5db46550933564c6d20ed103a8f02db867149c484703fc

  • SSDEEP

    3072:vhg701Xi+5RyHFaQ7RQ05CTEezbClXv8r8+oFe6gobFHFzA+E+2yQHcj/:pgA1XaFaQ7W05AEezbMPZFzAy2yA

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      19f077c8bef0103bf45481f1c00e324dc70ac92c8168748531fc966608c4d949

    • Size

      261KB

    • MD5

      1193b2ef04927456bbe196b92083e08b

    • SHA1

      d47e91bf715e9b18c399a18198db7b78bf25d138

    • SHA256

      19f077c8bef0103bf45481f1c00e324dc70ac92c8168748531fc966608c4d949

    • SHA512

      a51a68c98404f98171fb682068eb95278ab125e8c5ce9e9e4b7ed6af9b410863820fb63f56b4003d8b5db46550933564c6d20ed103a8f02db867149c484703fc

    • SSDEEP

      3072:vhg701Xi+5RyHFaQ7RQ05CTEezbClXv8r8+oFe6gobFHFzA+E+2yQHcj/:pgA1XaFaQ7W05AEezbMPZFzAy2yA

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks