General

  • Target

    422d9fec1aaac439614257d3ce441e29062ad5b8fb070c9e5f66d9553d43cbfb

  • Size

    282KB

  • Sample

    230608-eyk4xace5z

  • MD5

    97e285e32401e700090f1d9164b6f79c

  • SHA1

    9eca87b1d1936b1173eb45e20e4aeb8125bed34d

  • SHA256

    422d9fec1aaac439614257d3ce441e29062ad5b8fb070c9e5f66d9553d43cbfb

  • SHA512

    cbc4bc867389f4515c36df04db7594cb8b7fe8d1e27d165331156d7911720ada366816b5ad4891034494ec0a85a28d48abd7afd59cb225a628f0fb498be11f33

  • SSDEEP

    6144:6QvoWvJMhjVkwvTygXUNVS4MGh1aBFrvz1xcxcWhTrt:6UyByR1aBFrvz1xcxdTrt

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      422d9fec1aaac439614257d3ce441e29062ad5b8fb070c9e5f66d9553d43cbfb

    • Size

      282KB

    • MD5

      97e285e32401e700090f1d9164b6f79c

    • SHA1

      9eca87b1d1936b1173eb45e20e4aeb8125bed34d

    • SHA256

      422d9fec1aaac439614257d3ce441e29062ad5b8fb070c9e5f66d9553d43cbfb

    • SHA512

      cbc4bc867389f4515c36df04db7594cb8b7fe8d1e27d165331156d7911720ada366816b5ad4891034494ec0a85a28d48abd7afd59cb225a628f0fb498be11f33

    • SSDEEP

      6144:6QvoWvJMhjVkwvTygXUNVS4MGh1aBFrvz1xcxcWhTrt:6UyByR1aBFrvz1xcxdTrt

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks