General

  • Target

    2f3a770a93de4649b2bd8329022f108fb51429408f883e2be51ac1aaa10321be

  • Size

    251KB

  • Sample

    230607-zjfwvsgc8t

  • MD5

    c63b91799dbf9096978cdebc28fb2ea0

  • SHA1

    412924948b40772ad395224e12762e37d996986b

  • SHA256

    2f3a770a93de4649b2bd8329022f108fb51429408f883e2be51ac1aaa10321be

  • SHA512

    e9b7a9bb4d2b0d1eac83224dd0476e8f1d7c3554b9a6b6e0115397f43afe8a1295be3912e7309c704e1b4ae83dbc4726022b7c5a70df3a5cb54bae804ca98484

  • SSDEEP

    3072:k9VyvkRDYynwvT3NLOLxgXUNVS4umqTXQQGVjryLjDXQaBFrvz1xcdxbwOAtSqx:L8DwvTygXUNVS4MGh1aBFrvz1xcxcf

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      2f3a770a93de4649b2bd8329022f108fb51429408f883e2be51ac1aaa10321be

    • Size

      251KB

    • MD5

      c63b91799dbf9096978cdebc28fb2ea0

    • SHA1

      412924948b40772ad395224e12762e37d996986b

    • SHA256

      2f3a770a93de4649b2bd8329022f108fb51429408f883e2be51ac1aaa10321be

    • SHA512

      e9b7a9bb4d2b0d1eac83224dd0476e8f1d7c3554b9a6b6e0115397f43afe8a1295be3912e7309c704e1b4ae83dbc4726022b7c5a70df3a5cb54bae804ca98484

    • SSDEEP

      3072:k9VyvkRDYynwvT3NLOLxgXUNVS4umqTXQQGVjryLjDXQaBFrvz1xcdxbwOAtSqx:L8DwvTygXUNVS4MGh1aBFrvz1xcxcf

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks