General

  • Target

    dfddb9800e9f94f621b3bb77b865ea2c458951a87668f569931381930138dd99

  • Size

    282KB

  • Sample

    230608-f2fh9sda7t

  • MD5

    43477708917cbf639c563853db39d9d0

  • SHA1

    914f7ad1dc92bcd161be6882f7575844cf27c930

  • SHA256

    dfddb9800e9f94f621b3bb77b865ea2c458951a87668f569931381930138dd99

  • SHA512

    bf8f8ab47cf8bdae33acf111b5158c8f208a154c95eafad1dfd2ed52e9c8ff6e7811ba4abebfc4329b6ff23aa546ee4309c62b7a594d463c0a927cd10c2a0c87

  • SSDEEP

    6144:YQvoWvJlqJRwvTygXUNVS4MGh1aBFrvz1xcxcWhZrtl:YUa8yR1aBFrvz1xcxdZrtl

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      dfddb9800e9f94f621b3bb77b865ea2c458951a87668f569931381930138dd99

    • Size

      282KB

    • MD5

      43477708917cbf639c563853db39d9d0

    • SHA1

      914f7ad1dc92bcd161be6882f7575844cf27c930

    • SHA256

      dfddb9800e9f94f621b3bb77b865ea2c458951a87668f569931381930138dd99

    • SHA512

      bf8f8ab47cf8bdae33acf111b5158c8f208a154c95eafad1dfd2ed52e9c8ff6e7811ba4abebfc4329b6ff23aa546ee4309c62b7a594d463c0a927cd10c2a0c87

    • SSDEEP

      6144:YQvoWvJlqJRwvTygXUNVS4MGh1aBFrvz1xcxcWhZrtl:YUa8yR1aBFrvz1xcxdZrtl

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks