General

  • Target

    5617c08b385ba850cff2823ae0f410f38bb390908a90025e145ffa2140bd54de

  • Size

    282KB

  • Sample

    230608-dtdzcsbd86

  • MD5

    2a3620ffe64efe4b6c6e8fb85042a23c

  • SHA1

    a581a46c144744fd86aacc4f6e77b9a091334823

  • SHA256

    5617c08b385ba850cff2823ae0f410f38bb390908a90025e145ffa2140bd54de

  • SHA512

    60fd82be3ffe2c68b7287eaa35dcccdbfbf78b0d726a8e684486fb57c6c2ce9a8d41e4c3f8472a06dc6d7338bb1d517a08df68f8ed93f5e0cc4925cb95458c96

  • SSDEEP

    6144:rQvoWvJ+ockwvTygXUNVS4MGh1aBFrvz1xcxcWh5rt:rUJmyR1aBFrvz1xcxd5rt

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      5617c08b385ba850cff2823ae0f410f38bb390908a90025e145ffa2140bd54de

    • Size

      282KB

    • MD5

      2a3620ffe64efe4b6c6e8fb85042a23c

    • SHA1

      a581a46c144744fd86aacc4f6e77b9a091334823

    • SHA256

      5617c08b385ba850cff2823ae0f410f38bb390908a90025e145ffa2140bd54de

    • SHA512

      60fd82be3ffe2c68b7287eaa35dcccdbfbf78b0d726a8e684486fb57c6c2ce9a8d41e4c3f8472a06dc6d7338bb1d517a08df68f8ed93f5e0cc4925cb95458c96

    • SSDEEP

      6144:rQvoWvJ+ockwvTygXUNVS4MGh1aBFrvz1xcxcWh5rt:rUJmyR1aBFrvz1xcxd5rt

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks