General

  • Target

    a86d7fb108d1c025c40e3bfe09831559cab2056e6109c984c1c2157230137f18

  • Size

    261KB

  • Sample

    230607-x6m8cafe31

  • MD5

    682ae90859c641322db13f0e90282914

  • SHA1

    fb54cf2d2a783febdf0c4f96ba92b63bf9c08290

  • SHA256

    a86d7fb108d1c025c40e3bfe09831559cab2056e6109c984c1c2157230137f18

  • SHA512

    d3a218f513e64c3a6c12d8408984427065d3bdf53fb1fd41ac4a71cee4b8fe416daadd1daa5af4b5c201141df5ae4bb536f497da0675b20c2a8d9bb1c94cc40a

  • SSDEEP

    3072:fhg7wH1TrZRyHFaQ7RQ05CTEezbClXv8r8+oFe6gobFHFzA+E+2yQHcj/:5g8H1GFaQ7W05AEezbMPZFzAy2yA

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      a86d7fb108d1c025c40e3bfe09831559cab2056e6109c984c1c2157230137f18

    • Size

      261KB

    • MD5

      682ae90859c641322db13f0e90282914

    • SHA1

      fb54cf2d2a783febdf0c4f96ba92b63bf9c08290

    • SHA256

      a86d7fb108d1c025c40e3bfe09831559cab2056e6109c984c1c2157230137f18

    • SHA512

      d3a218f513e64c3a6c12d8408984427065d3bdf53fb1fd41ac4a71cee4b8fe416daadd1daa5af4b5c201141df5ae4bb536f497da0675b20c2a8d9bb1c94cc40a

    • SSDEEP

      3072:fhg7wH1TrZRyHFaQ7RQ05CTEezbClXv8r8+oFe6gobFHFzA+E+2yQHcj/:5g8H1GFaQ7W05AEezbMPZFzAy2yA

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks