General

  • Target

    27e92bcdd232be9c012588ff11f3842011b5fd8189cc5b8f11205a9d9296816f

  • Size

    261KB

  • Sample

    230607-tvdmzsdd2y

  • MD5

    d565b212e66dcbe3a96cf15ad57869dd

  • SHA1

    611779405d57ac900602b219d416a6aceed977e5

  • SHA256

    27e92bcdd232be9c012588ff11f3842011b5fd8189cc5b8f11205a9d9296816f

  • SHA512

    85edc1fc56076c368abc30a2bed0dd3a1c230196d6871b4bc621e127ca867e2b32d6ab2fb2cb63923e633fc729ddea3359fdb39a1c0cbe52715c0930ec8411be

  • SSDEEP

    3072:Dhg73zv1GOdRyHFaQ7RQ05CTEezbClXv8r8+oFe6gobFHFzA+E+2yQHcj/:1g/v1yFaQ7W05AEezbMPZFzAy2yA

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      27e92bcdd232be9c012588ff11f3842011b5fd8189cc5b8f11205a9d9296816f

    • Size

      261KB

    • MD5

      d565b212e66dcbe3a96cf15ad57869dd

    • SHA1

      611779405d57ac900602b219d416a6aceed977e5

    • SHA256

      27e92bcdd232be9c012588ff11f3842011b5fd8189cc5b8f11205a9d9296816f

    • SHA512

      85edc1fc56076c368abc30a2bed0dd3a1c230196d6871b4bc621e127ca867e2b32d6ab2fb2cb63923e633fc729ddea3359fdb39a1c0cbe52715c0930ec8411be

    • SSDEEP

      3072:Dhg73zv1GOdRyHFaQ7RQ05CTEezbClXv8r8+oFe6gobFHFzA+E+2yQHcj/:1g/v1yFaQ7W05AEezbMPZFzAy2yA

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks