General

  • Target

    fa302ddd248d35d1c22a8fceb619a9b61e7ba1be8a6a9ef4f2157729d019458f

  • Size

    262KB

  • Sample

    230607-yvnkeafd53

  • MD5

    0b4d8a5d2857b9e58f5f0f0ef993c12c

  • SHA1

    42aae3a4a38d3403bbe756b0f2adde3570c28874

  • SHA256

    fa302ddd248d35d1c22a8fceb619a9b61e7ba1be8a6a9ef4f2157729d019458f

  • SHA512

    7594a7f8e17272f422cbdb6c42f5ac42699c1af9661458cde47ac5e094f3aa4f986071fdffaaaeaed617b0a6a3ffb06fd85f2ece4cc5eb9f61741ef708822539

  • SSDEEP

    3072:fhg7wH1TrZRyHFaQ7RQ05CTEezbClXv8r8+oFe6gobFHFzA+E+2yQHcj/:5g8H1GFaQ7W05AEezbMPZFzAy2yA

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      fa302ddd248d35d1c22a8fceb619a9b61e7ba1be8a6a9ef4f2157729d019458f

    • Size

      262KB

    • MD5

      0b4d8a5d2857b9e58f5f0f0ef993c12c

    • SHA1

      42aae3a4a38d3403bbe756b0f2adde3570c28874

    • SHA256

      fa302ddd248d35d1c22a8fceb619a9b61e7ba1be8a6a9ef4f2157729d019458f

    • SHA512

      7594a7f8e17272f422cbdb6c42f5ac42699c1af9661458cde47ac5e094f3aa4f986071fdffaaaeaed617b0a6a3ffb06fd85f2ece4cc5eb9f61741ef708822539

    • SSDEEP

      3072:fhg7wH1TrZRyHFaQ7RQ05CTEezbClXv8r8+oFe6gobFHFzA+E+2yQHcj/:5g8H1GFaQ7W05AEezbMPZFzAy2yA

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks