General

  • Target

    133c7a42acee7bf3671296852f69e08a4487f186defdb8e7a816736b947f54b3

  • Size

    282KB

  • Sample

    230608-ddc25abg4s

  • MD5

    5489b3db08e7f3e2d82a3a81d02ed381

  • SHA1

    29fd4fd569203ad2419b89cd4ce5fc899bbd01af

  • SHA256

    133c7a42acee7bf3671296852f69e08a4487f186defdb8e7a816736b947f54b3

  • SHA512

    2f151fb3dc2d1ac61a6aa102d4b160f1cf09199fcd81b1d8f69ebf25f245b1e8cb4d5189298a7e7e8fe2a9079a00e1fdf2f7c582d69c885de552f3d2acf795d8

  • SSDEEP

    6144:VQvoWvJLKcjwvTygXUNVS4MGh1aBFrvz1xcxcWhHrt:VU8tyR1aBFrvz1xcxdHrt

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      133c7a42acee7bf3671296852f69e08a4487f186defdb8e7a816736b947f54b3

    • Size

      282KB

    • MD5

      5489b3db08e7f3e2d82a3a81d02ed381

    • SHA1

      29fd4fd569203ad2419b89cd4ce5fc899bbd01af

    • SHA256

      133c7a42acee7bf3671296852f69e08a4487f186defdb8e7a816736b947f54b3

    • SHA512

      2f151fb3dc2d1ac61a6aa102d4b160f1cf09199fcd81b1d8f69ebf25f245b1e8cb4d5189298a7e7e8fe2a9079a00e1fdf2f7c582d69c885de552f3d2acf795d8

    • SSDEEP

      6144:VQvoWvJLKcjwvTygXUNVS4MGh1aBFrvz1xcxcWhHrt:VU8tyR1aBFrvz1xcxdHrt

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks