General

  • Target

    ff74d653aff57be3b6a4ea050f0e2e83120087a62849f5cca64310975cfd518e

  • Size

    282KB

  • Sample

    230608-agzhrahe96

  • MD5

    7db68e1802be44c1f5353506352878e3

  • SHA1

    bb7d0ea66898018338a1f79d2178f657181f9809

  • SHA256

    ff74d653aff57be3b6a4ea050f0e2e83120087a62849f5cca64310975cfd518e

  • SHA512

    6fdaf20802dc1074a9d154e803790bdaa30ca64e319b4b33c96195b212b41f1e0a743b22ceaea0a26de86dfd5b5c6c7ba15584b8fd151aad52e6b27773b7d5f8

  • SSDEEP

    6144:WQvoWvJug4OdwvTygXUNVS4MGh1aBFrvz1xcxcWhgrtl:WU4hTyR1aBFrvz1xcxdgrtl

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      ff74d653aff57be3b6a4ea050f0e2e83120087a62849f5cca64310975cfd518e

    • Size

      282KB

    • MD5

      7db68e1802be44c1f5353506352878e3

    • SHA1

      bb7d0ea66898018338a1f79d2178f657181f9809

    • SHA256

      ff74d653aff57be3b6a4ea050f0e2e83120087a62849f5cca64310975cfd518e

    • SHA512

      6fdaf20802dc1074a9d154e803790bdaa30ca64e319b4b33c96195b212b41f1e0a743b22ceaea0a26de86dfd5b5c6c7ba15584b8fd151aad52e6b27773b7d5f8

    • SSDEEP

      6144:WQvoWvJug4OdwvTygXUNVS4MGh1aBFrvz1xcxcWhgrtl:WU4hTyR1aBFrvz1xcxdgrtl

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks