General

  • Target

    e9ce20047f2c010095e4bf4b6f743bfb9763c51c0a919e06165d5dea228ecdd8

  • Size

    282KB

  • Sample

    230608-apz49ahf93

  • MD5

    348ea51cb4b194f9643a67ac2151c27b

  • SHA1

    8e051be888e2df32be67a714eefcf827f09e357a

  • SHA256

    e9ce20047f2c010095e4bf4b6f743bfb9763c51c0a919e06165d5dea228ecdd8

  • SHA512

    5a27119997c4b162d29ae58ac123084ffae454b5335d7e952cb26701b726e385f33de3a1e1a861088c9cf0b6253f153d2bd0d38406b9bc841c512de283d373db

  • SSDEEP

    6144:GQvoWvJmW8NwvTygXUNVS4MGh1aBFrvz1xcxcWhMrt:GU7ryR1aBFrvz1xcxdMrt

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      e9ce20047f2c010095e4bf4b6f743bfb9763c51c0a919e06165d5dea228ecdd8

    • Size

      282KB

    • MD5

      348ea51cb4b194f9643a67ac2151c27b

    • SHA1

      8e051be888e2df32be67a714eefcf827f09e357a

    • SHA256

      e9ce20047f2c010095e4bf4b6f743bfb9763c51c0a919e06165d5dea228ecdd8

    • SHA512

      5a27119997c4b162d29ae58ac123084ffae454b5335d7e952cb26701b726e385f33de3a1e1a861088c9cf0b6253f153d2bd0d38406b9bc841c512de283d373db

    • SSDEEP

      6144:GQvoWvJmW8NwvTygXUNVS4MGh1aBFrvz1xcxcWhMrt:GU7ryR1aBFrvz1xcxdMrt

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks