General

  • Target

    641097c9db3c8d3fe893aa59c9abcc6f0a3f8a8e06b2693d16f39fae1b716d19

  • Size

    282KB

  • Sample

    230608-cr9sksah49

  • MD5

    faaa46c2c71fe035c02c984175f16495

  • SHA1

    7770b6c6af94a2e0559c6b3caa283f25875c4941

  • SHA256

    641097c9db3c8d3fe893aa59c9abcc6f0a3f8a8e06b2693d16f39fae1b716d19

  • SHA512

    b362d6c3faea185032ccb6a410b3068cec90ff2db82bd046c022109e38352202bdd7e11df00004a7e0a500776acffcd8768322b87b029728736b3c54b3dd82b8

  • SSDEEP

    6144:PQvoWvJNmptwvTygXUNVS4MGh1aBFrvz1xcxcWhMrt:PUSQyR1aBFrvz1xcxdMrt

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      641097c9db3c8d3fe893aa59c9abcc6f0a3f8a8e06b2693d16f39fae1b716d19

    • Size

      282KB

    • MD5

      faaa46c2c71fe035c02c984175f16495

    • SHA1

      7770b6c6af94a2e0559c6b3caa283f25875c4941

    • SHA256

      641097c9db3c8d3fe893aa59c9abcc6f0a3f8a8e06b2693d16f39fae1b716d19

    • SHA512

      b362d6c3faea185032ccb6a410b3068cec90ff2db82bd046c022109e38352202bdd7e11df00004a7e0a500776acffcd8768322b87b029728736b3c54b3dd82b8

    • SSDEEP

      6144:PQvoWvJNmptwvTygXUNVS4MGh1aBFrvz1xcxcWhMrt:PUSQyR1aBFrvz1xcxdMrt

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks