General

  • Target

    b8187f5b1e3299b81a0ceb0c95ac456fabd67e47db86f21c7ffb3a649877c884

  • Size

    282KB

  • Sample

    230608-cgevfsbb8z

  • MD5

    1a22d8c111f4a4835229ed380d891364

  • SHA1

    91643a845f709443f44a0a4d876e5a6caca16f60

  • SHA256

    b8187f5b1e3299b81a0ceb0c95ac456fabd67e47db86f21c7ffb3a649877c884

  • SHA512

    784295c0a20a8c93ff55e724d5de64c015f7857272dba33c56091f9c4df32104278962275dcd8196846b58fdd7ae7b52d492cfece877a33e42d75f71a74ced9b

  • SSDEEP

    6144:6QvoWvJCO5iwvTygXUNVS4MGh1aBFrvz1xcxcWh7rt:6UVDyR1aBFrvz1xcxd7rt

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      b8187f5b1e3299b81a0ceb0c95ac456fabd67e47db86f21c7ffb3a649877c884

    • Size

      282KB

    • MD5

      1a22d8c111f4a4835229ed380d891364

    • SHA1

      91643a845f709443f44a0a4d876e5a6caca16f60

    • SHA256

      b8187f5b1e3299b81a0ceb0c95ac456fabd67e47db86f21c7ffb3a649877c884

    • SHA512

      784295c0a20a8c93ff55e724d5de64c015f7857272dba33c56091f9c4df32104278962275dcd8196846b58fdd7ae7b52d492cfece877a33e42d75f71a74ced9b

    • SSDEEP

      6144:6QvoWvJCO5iwvTygXUNVS4MGh1aBFrvz1xcxcWh7rt:6UVDyR1aBFrvz1xcxd7rt

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks