General

  • Target

    d85fabc3417f089606ed10674c7472ac992b6588032868d83cb248f812739cca

  • Size

    261KB

  • Sample

    230607-v17cxseb4y

  • MD5

    510eb8019df4a9360e12f54d3f2b1b50

  • SHA1

    e9dedc8ecc066fe4afcdb1ce11675dbf75298c5c

  • SHA256

    d85fabc3417f089606ed10674c7472ac992b6588032868d83cb248f812739cca

  • SHA512

    cb0a3074b6a24fb23618575ca4779dbb2ceac702365327a9c75625251630e721cbc061150f861f1c1e3040dfe9df37785bbc56ff370f41c0f6c32c19ba5fd5e7

  • SSDEEP

    3072:yhg741juiRyHFaQ7RQ05CTEezbClXv8r8+oFe6gobFHFzA+E+2yQHcj/:2gE1GFaQ7W05AEezbMPZFzAy2yA

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      d85fabc3417f089606ed10674c7472ac992b6588032868d83cb248f812739cca

    • Size

      261KB

    • MD5

      510eb8019df4a9360e12f54d3f2b1b50

    • SHA1

      e9dedc8ecc066fe4afcdb1ce11675dbf75298c5c

    • SHA256

      d85fabc3417f089606ed10674c7472ac992b6588032868d83cb248f812739cca

    • SHA512

      cb0a3074b6a24fb23618575ca4779dbb2ceac702365327a9c75625251630e721cbc061150f861f1c1e3040dfe9df37785bbc56ff370f41c0f6c32c19ba5fd5e7

    • SSDEEP

      3072:yhg741juiRyHFaQ7RQ05CTEezbClXv8r8+oFe6gobFHFzA+E+2yQHcj/:2gE1GFaQ7W05AEezbMPZFzAy2yA

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks