General

  • Target

    5f125e2680addf662e8f9eca01993335ecc905e1a5d46d941cf7f02ac18f3b08

  • Size

    261KB

  • Sample

    230607-wwnwfseb67

  • MD5

    044efe5db9a6b14b7595945229f02f79

  • SHA1

    5598fe9a275ce4703a16896987438e75485c3087

  • SHA256

    5f125e2680addf662e8f9eca01993335ecc905e1a5d46d941cf7f02ac18f3b08

  • SHA512

    c074d550e5dcaaba0abbde765855dfa67890c1ada2e5b2a0c324bd4514d54c9a7ccd84dfc1543dbe44e488cc6932e480ceb1cc18a1d16fedfc9ffa420321145a

  • SSDEEP

    3072:vhg7SH13OARyHFaQ7RQ05CTEezbClXv8r8+oFe6gobFHFzA+E+2yQHcj/:pgWH1QFaQ7W05AEezbMPZFzAy2yA

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      5f125e2680addf662e8f9eca01993335ecc905e1a5d46d941cf7f02ac18f3b08

    • Size

      261KB

    • MD5

      044efe5db9a6b14b7595945229f02f79

    • SHA1

      5598fe9a275ce4703a16896987438e75485c3087

    • SHA256

      5f125e2680addf662e8f9eca01993335ecc905e1a5d46d941cf7f02ac18f3b08

    • SHA512

      c074d550e5dcaaba0abbde765855dfa67890c1ada2e5b2a0c324bd4514d54c9a7ccd84dfc1543dbe44e488cc6932e480ceb1cc18a1d16fedfc9ffa420321145a

    • SSDEEP

      3072:vhg7SH13OARyHFaQ7RQ05CTEezbClXv8r8+oFe6gobFHFzA+E+2yQHcj/:pgWH1QFaQ7W05AEezbMPZFzAy2yA

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks