General

  • Target

    a0988d8e9007531e03fc38996f1890b17e4550e5c7de0bac1b1a62d162bcbe8d

  • Size

    261KB

  • Sample

    230607-ye2r4aff7z

  • MD5

    8407064e79f06dddb9a110a1e4809352

  • SHA1

    197e5753e304dd412059c965c56f209732119573

  • SHA256

    a0988d8e9007531e03fc38996f1890b17e4550e5c7de0bac1b1a62d162bcbe8d

  • SHA512

    125ee80423d715c39a4018b06273c8f9bd1e617781bcd73af9548f621012858b7dc461a8907df353971932bfdec78d6f5314441f3192199b1e9e472938fdc1e7

  • SSDEEP

    3072:fhg7wH1TrZRyHFaQ7RQ05CTEezbClXv8r8+oFe6gobFHFzA+E+2yQHcj/:5g8H1GFaQ7W05AEezbMPZFzAy2yA

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      a0988d8e9007531e03fc38996f1890b17e4550e5c7de0bac1b1a62d162bcbe8d

    • Size

      261KB

    • MD5

      8407064e79f06dddb9a110a1e4809352

    • SHA1

      197e5753e304dd412059c965c56f209732119573

    • SHA256

      a0988d8e9007531e03fc38996f1890b17e4550e5c7de0bac1b1a62d162bcbe8d

    • SHA512

      125ee80423d715c39a4018b06273c8f9bd1e617781bcd73af9548f621012858b7dc461a8907df353971932bfdec78d6f5314441f3192199b1e9e472938fdc1e7

    • SSDEEP

      3072:fhg7wH1TrZRyHFaQ7RQ05CTEezbClXv8r8+oFe6gobFHFzA+E+2yQHcj/:5g8H1GFaQ7W05AEezbMPZFzAy2yA

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks