General

  • Target

    0b5af3f9011463f772d3ec2077228b0f1347a9fa464e00f4338b0dd81de2b4af

  • Size

    270KB

  • Sample

    230607-zavcwsff39

  • MD5

    e087e1b8cb04c48eb29e65d30096538f

  • SHA1

    abbcdf9f148557c890808dd81646da7bea1c50ef

  • SHA256

    0b5af3f9011463f772d3ec2077228b0f1347a9fa464e00f4338b0dd81de2b4af

  • SHA512

    b906b658371b2d50e79761d4bf6ba4d4f601c5c9c27e5bbda4cffbb1381136bbf714e0dd700417a4db44b99a9c26f22b097c8d959f65042e21c8a1633007edcd

  • SSDEEP

    6144:1QGVr+2WwvTygXUNVS4MGh1aBFrvz1xcxcr:TVrZyR1aBFrvz1xcx

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      0b5af3f9011463f772d3ec2077228b0f1347a9fa464e00f4338b0dd81de2b4af

    • Size

      270KB

    • MD5

      e087e1b8cb04c48eb29e65d30096538f

    • SHA1

      abbcdf9f148557c890808dd81646da7bea1c50ef

    • SHA256

      0b5af3f9011463f772d3ec2077228b0f1347a9fa464e00f4338b0dd81de2b4af

    • SHA512

      b906b658371b2d50e79761d4bf6ba4d4f601c5c9c27e5bbda4cffbb1381136bbf714e0dd700417a4db44b99a9c26f22b097c8d959f65042e21c8a1633007edcd

    • SSDEEP

      6144:1QGVr+2WwvTygXUNVS4MGh1aBFrvz1xcxcr:TVrZyR1aBFrvz1xcx

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks