General

  • Target

    1b1d4b051733e07e2012ef7094819b0573b42f8a72c11a8d97d8125f724bd2af

  • Size

    282KB

  • Sample

    230608-d5xkvacb3z

  • MD5

    6184845c52c10144a1e9279d92c827f0

  • SHA1

    c752e6bbd8648ac25d5716d34d2ed54e9e86a1f5

  • SHA256

    1b1d4b051733e07e2012ef7094819b0573b42f8a72c11a8d97d8125f724bd2af

  • SHA512

    51f1659aa591b90ef42db7a8a973e97edda72a59c8c5987ec5624b1f00e67f37dd230ceb43507fcd08c6f6c200e6fe101257f85e9d302a761fbe3a6f5d7b1bd1

  • SSDEEP

    6144:UQvoWvJJmT7WrwvTygXUNVS4MGh1aBFrvz1xcxcWhbrtn:UUvm31yR1aBFrvz1xcxdbrtn

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      1b1d4b051733e07e2012ef7094819b0573b42f8a72c11a8d97d8125f724bd2af

    • Size

      282KB

    • MD5

      6184845c52c10144a1e9279d92c827f0

    • SHA1

      c752e6bbd8648ac25d5716d34d2ed54e9e86a1f5

    • SHA256

      1b1d4b051733e07e2012ef7094819b0573b42f8a72c11a8d97d8125f724bd2af

    • SHA512

      51f1659aa591b90ef42db7a8a973e97edda72a59c8c5987ec5624b1f00e67f37dd230ceb43507fcd08c6f6c200e6fe101257f85e9d302a761fbe3a6f5d7b1bd1

    • SSDEEP

      6144:UQvoWvJJmT7WrwvTygXUNVS4MGh1aBFrvz1xcxcWhbrtn:UUvm31yR1aBFrvz1xcxdbrtn

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks