General

  • Target

    9743d58e0c44fce5f85027ac809c940cccaa8aa433a06a499892bb6a4550189c

  • Size

    282KB

  • Sample

    230608-dwg4ssca3z

  • MD5

    68679b2dc0ee9de87d19105b37bf9c2a

  • SHA1

    733543d87d7b4a3368e323742b40d5ccbbb526b8

  • SHA256

    9743d58e0c44fce5f85027ac809c940cccaa8aa433a06a499892bb6a4550189c

  • SHA512

    351cb0a08e80f2e9f0aebad018904a6d91bde2a91699b43d7736161e0b3d66a7254e4ec341826a240716f1e285671714707e808e8b0c3c6d4ddbd5f6eb34be6a

  • SSDEEP

    6144:CQvoWvJqDt2wvTygXUNVS4MGh1aBFrvz1xcxcWhirtl:CUmLyR1aBFrvz1xcxdirtl

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      9743d58e0c44fce5f85027ac809c940cccaa8aa433a06a499892bb6a4550189c

    • Size

      282KB

    • MD5

      68679b2dc0ee9de87d19105b37bf9c2a

    • SHA1

      733543d87d7b4a3368e323742b40d5ccbbb526b8

    • SHA256

      9743d58e0c44fce5f85027ac809c940cccaa8aa433a06a499892bb6a4550189c

    • SHA512

      351cb0a08e80f2e9f0aebad018904a6d91bde2a91699b43d7736161e0b3d66a7254e4ec341826a240716f1e285671714707e808e8b0c3c6d4ddbd5f6eb34be6a

    • SSDEEP

      6144:CQvoWvJqDt2wvTygXUNVS4MGh1aBFrvz1xcxcWhirtl:CUmLyR1aBFrvz1xcxdirtl

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks