General

  • Target

    2a071fd7e5c6344f0d9dcdff4f8b0aa8a23e46795df6359260ecf6b1ed6d832a

  • Size

    282KB

  • Sample

    230608-ak621aab4t

  • MD5

    29a1ffa46dd13725a0307d5ae8127033

  • SHA1

    f5d91ae67f86aaba34629095078e043e108d6898

  • SHA256

    2a071fd7e5c6344f0d9dcdff4f8b0aa8a23e46795df6359260ecf6b1ed6d832a

  • SHA512

    74032f6e0d8b4c3d856165c05239c353178db9c5ce33b13feceb4ea02c9b286b54c4476a37238f861314eef56c9fb7a2b37854ab861e8612052d947b9eb97f33

  • SSDEEP

    6144:rQvoWvJfoZuwvTygXUNVS4MGh1aBFrvz1xcxcWh9rt:rUO/yR1aBFrvz1xcxd9rt

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      2a071fd7e5c6344f0d9dcdff4f8b0aa8a23e46795df6359260ecf6b1ed6d832a

    • Size

      282KB

    • MD5

      29a1ffa46dd13725a0307d5ae8127033

    • SHA1

      f5d91ae67f86aaba34629095078e043e108d6898

    • SHA256

      2a071fd7e5c6344f0d9dcdff4f8b0aa8a23e46795df6359260ecf6b1ed6d832a

    • SHA512

      74032f6e0d8b4c3d856165c05239c353178db9c5ce33b13feceb4ea02c9b286b54c4476a37238f861314eef56c9fb7a2b37854ab861e8612052d947b9eb97f33

    • SSDEEP

      6144:rQvoWvJfoZuwvTygXUNVS4MGh1aBFrvz1xcxcWh9rt:rUO/yR1aBFrvz1xcxd9rt

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks