General

  • Target

    d97f5ca3031d525021f6743c692857b604f9db34c4ab33e0f4b2acf1027f6ab2

  • Size

    261KB

  • Sample

    230607-wrgataeb23

  • MD5

    ff2faaba2afd7363d6b3b0198d75351c

  • SHA1

    ad0d5aaec811bd6dd2dc13397a930dbac299a248

  • SHA256

    d97f5ca3031d525021f6743c692857b604f9db34c4ab33e0f4b2acf1027f6ab2

  • SHA512

    9e86bbfaa5a843d554e3e1554bdb87e26f700f4d8abf1676771c9092ac268d0466f81087d2111037b54871fe907e7d39416e36880cd37249b649de3e661920ac

  • SSDEEP

    3072:hhg7b1XbuRyHFaQ7RQ05CTEezbClXv8r8+oFe6gobFHFzA+E+2yQHcj/:ng31nFaQ7W05AEezbMPZFzAy2yA

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      d97f5ca3031d525021f6743c692857b604f9db34c4ab33e0f4b2acf1027f6ab2

    • Size

      261KB

    • MD5

      ff2faaba2afd7363d6b3b0198d75351c

    • SHA1

      ad0d5aaec811bd6dd2dc13397a930dbac299a248

    • SHA256

      d97f5ca3031d525021f6743c692857b604f9db34c4ab33e0f4b2acf1027f6ab2

    • SHA512

      9e86bbfaa5a843d554e3e1554bdb87e26f700f4d8abf1676771c9092ac268d0466f81087d2111037b54871fe907e7d39416e36880cd37249b649de3e661920ac

    • SSDEEP

      3072:hhg7b1XbuRyHFaQ7RQ05CTEezbClXv8r8+oFe6gobFHFzA+E+2yQHcj/:ng31nFaQ7W05AEezbMPZFzAy2yA

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks