General

  • Target

    bb929540afc5c1c0f25b896143d563ea512c335a0bb1369bfce19b61272c78d2

  • Size

    261KB

  • Sample

    230607-xmm38sef29

  • MD5

    6e49e40ff7c68fa8aa0fe4864fdf788b

  • SHA1

    d08744adb4715fadb0dd6b5a9d16bccaeed2c10d

  • SHA256

    bb929540afc5c1c0f25b896143d563ea512c335a0bb1369bfce19b61272c78d2

  • SHA512

    03a625d6af651541d56607f2f89e0b2e28e08c530a2aa8b62e07815d0adbdcecc7b79ca7c2ea274d7360bda294d8a8fed2ec8d2da3756c79a696e818fb4bd6f0

  • SSDEEP

    3072:3hg7cw1g+pRyHFaQ7RQ05CTEezbClXv8r8+oFe6gobFHFzA+E+2yQHcj/:RgIw1wFaQ7W05AEezbMPZFzAy2yA

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      bb929540afc5c1c0f25b896143d563ea512c335a0bb1369bfce19b61272c78d2

    • Size

      261KB

    • MD5

      6e49e40ff7c68fa8aa0fe4864fdf788b

    • SHA1

      d08744adb4715fadb0dd6b5a9d16bccaeed2c10d

    • SHA256

      bb929540afc5c1c0f25b896143d563ea512c335a0bb1369bfce19b61272c78d2

    • SHA512

      03a625d6af651541d56607f2f89e0b2e28e08c530a2aa8b62e07815d0adbdcecc7b79ca7c2ea274d7360bda294d8a8fed2ec8d2da3756c79a696e818fb4bd6f0

    • SSDEEP

      3072:3hg7cw1g+pRyHFaQ7RQ05CTEezbClXv8r8+oFe6gobFHFzA+E+2yQHcj/:RgIw1wFaQ7W05AEezbMPZFzAy2yA

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks