General

  • Target

    4e298605a63cb230de0995511000bb64b3508706ee5d21cbeb850975ee8931b6

  • Size

    261KB

  • Sample

    230607-th18hsce92

  • MD5

    b8c0c3213fa728e27ebc7432b48bbb17

  • SHA1

    f5ac77231a020fe15f80426bf3cac4ec276f9359

  • SHA256

    4e298605a63cb230de0995511000bb64b3508706ee5d21cbeb850975ee8931b6

  • SHA512

    0e05dd8a00e5ba4f6c6e6f94df67e3b520af46441a9517b484884e185498ed052a616ab768d848d81a4bef6ceeabcfd3fd09a13e2fea7e2d926a62c0bc94905b

  • SSDEEP

    3072:2hg7Fd1x+JRyHFaQ7RQ05CTEezbClXv8r8+oFe6gobFHFzA+E+2yQHcj/:ygZd11FaQ7W05AEezbMPZFzAy2yA

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      4e298605a63cb230de0995511000bb64b3508706ee5d21cbeb850975ee8931b6

    • Size

      261KB

    • MD5

      b8c0c3213fa728e27ebc7432b48bbb17

    • SHA1

      f5ac77231a020fe15f80426bf3cac4ec276f9359

    • SHA256

      4e298605a63cb230de0995511000bb64b3508706ee5d21cbeb850975ee8931b6

    • SHA512

      0e05dd8a00e5ba4f6c6e6f94df67e3b520af46441a9517b484884e185498ed052a616ab768d848d81a4bef6ceeabcfd3fd09a13e2fea7e2d926a62c0bc94905b

    • SSDEEP

      3072:2hg7Fd1x+JRyHFaQ7RQ05CTEezbClXv8r8+oFe6gobFHFzA+E+2yQHcj/:ygZd11FaQ7W05AEezbMPZFzAy2yA

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks