General

  • Target

    09824199.exe

  • Size

    261KB

  • Sample

    230607-vefyvadg7v

  • MD5

    e78c61e9f1ea309f9d3ffc6ac70e2caa

  • SHA1

    92fc3edc3e510799967ff472559f43fb7cfaed8f

  • SHA256

    2eecf812f6f31a040634520e783e83273e52daa7684ebaaa0b99e46d3e0d48b8

  • SHA512

    09ea5fe5991a10cf8c1a41535038982d8971b697fd57a6fd17208486c20aa7f9fc19c316417dee9a7dd92229969224a148af65b276c58c203ebac81c1b2e0a07

  • SSDEEP

    3072:vhg7A11Fde2RyHFaQ7RQ05CTEezbClXv8r8+oFe6gobFHFzA+E+2yQHcj/:pg01AFaQ7W05AEezbMPZFzAy2yA

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      09824199.exe

    • Size

      261KB

    • MD5

      e78c61e9f1ea309f9d3ffc6ac70e2caa

    • SHA1

      92fc3edc3e510799967ff472559f43fb7cfaed8f

    • SHA256

      2eecf812f6f31a040634520e783e83273e52daa7684ebaaa0b99e46d3e0d48b8

    • SHA512

      09ea5fe5991a10cf8c1a41535038982d8971b697fd57a6fd17208486c20aa7f9fc19c316417dee9a7dd92229969224a148af65b276c58c203ebac81c1b2e0a07

    • SSDEEP

      3072:vhg7A11Fde2RyHFaQ7RQ05CTEezbClXv8r8+oFe6gobFHFzA+E+2yQHcj/:pg01AFaQ7W05AEezbMPZFzAy2yA

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks