General

  • Target

    01349299.exe

  • Size

    261KB

  • Sample

    230607-t78c5ade7y

  • MD5

    932101ee24891a0e59161c4b62719a0b

  • SHA1

    6908b4add17206178040cd0b28252fbe97333f97

  • SHA256

    7e1daaea1a46c6079b4e7c2bfc98c3fb58cd1c7ea8372331dab98e2c924df223

  • SHA512

    0244e8fc50bc4d075050022fb25a908d90e6f88acb4b73dce6d2d8ce6cc5169081f33125963bd857d2fcdfd8ded6b01cb72de506b5ca8b54749ce29e0dbb8c1e

  • SSDEEP

    3072:rhg7p1jbSRyHFaQ7RQ05CTEezbClXv8r8+oFe6gobFHFzA+E+2yQHcj/:9gt1fFaQ7W05AEezbMPZFzAy2yA

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      01349299.exe

    • Size

      261KB

    • MD5

      932101ee24891a0e59161c4b62719a0b

    • SHA1

      6908b4add17206178040cd0b28252fbe97333f97

    • SHA256

      7e1daaea1a46c6079b4e7c2bfc98c3fb58cd1c7ea8372331dab98e2c924df223

    • SHA512

      0244e8fc50bc4d075050022fb25a908d90e6f88acb4b73dce6d2d8ce6cc5169081f33125963bd857d2fcdfd8ded6b01cb72de506b5ca8b54749ce29e0dbb8c1e

    • SSDEEP

      3072:rhg7p1jbSRyHFaQ7RQ05CTEezbClXv8r8+oFe6gobFHFzA+E+2yQHcj/:9gt1fFaQ7W05AEezbMPZFzAy2yA

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks