General

  • Target

    ce1e61f425ea7b99b0e8cf38f0b0f1ea202e7bc733e439a2c3ed17d3a7fc1408

  • Size

    282KB

  • Sample

    230608-bd766aab26

  • MD5

    195a4ef1f009c14543ec249949308254

  • SHA1

    7345d15962e1600f465494bcffbbdbfeb064b681

  • SHA256

    ce1e61f425ea7b99b0e8cf38f0b0f1ea202e7bc733e439a2c3ed17d3a7fc1408

  • SHA512

    1e94c6ddd1b8a857efc0b41d33905f6347530acd8b58868ffb29328d13d040b8cb1080725b2ee121f82b09a10633360fce0a0c0881b993effd9877dc41589643

  • SSDEEP

    6144:lQvoWvJSNJGwvTygXUNVS4MGh1aBFrvz1xcxcWhKrt:lUIDyR1aBFrvz1xcxdKrt

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      ce1e61f425ea7b99b0e8cf38f0b0f1ea202e7bc733e439a2c3ed17d3a7fc1408

    • Size

      282KB

    • MD5

      195a4ef1f009c14543ec249949308254

    • SHA1

      7345d15962e1600f465494bcffbbdbfeb064b681

    • SHA256

      ce1e61f425ea7b99b0e8cf38f0b0f1ea202e7bc733e439a2c3ed17d3a7fc1408

    • SHA512

      1e94c6ddd1b8a857efc0b41d33905f6347530acd8b58868ffb29328d13d040b8cb1080725b2ee121f82b09a10633360fce0a0c0881b993effd9877dc41589643

    • SSDEEP

      6144:lQvoWvJSNJGwvTygXUNVS4MGh1aBFrvz1xcxcWhKrt:lUIDyR1aBFrvz1xcxdKrt

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks