General

  • Target

    766d3fb59f70107a4e8e3f1db393f01f6215e50d052161f41a0df9f626cebdc9

  • Size

    282KB

  • Sample

    230608-fpyjbach4y

  • MD5

    cc46c6ab0f5ca42b457f3dc009d396fb

  • SHA1

    ebb2138491471a6ef5a57875fff51a5252124769

  • SHA256

    766d3fb59f70107a4e8e3f1db393f01f6215e50d052161f41a0df9f626cebdc9

  • SHA512

    8d6e16cb3a0a13d85531d5a2dfbd3638c75c39605e22e0d92733291650fa79fc25ac8e98bc1c48215bdf2f21f2132fa95cba9cc2a51664072b46b262fcf4c878

  • SSDEEP

    6144:eQvoWvJakXxwvTygXUNVS4MGh1aBFrvz1xcxcWhUrt:eUTuyR1aBFrvz1xcxdUrt

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      766d3fb59f70107a4e8e3f1db393f01f6215e50d052161f41a0df9f626cebdc9

    • Size

      282KB

    • MD5

      cc46c6ab0f5ca42b457f3dc009d396fb

    • SHA1

      ebb2138491471a6ef5a57875fff51a5252124769

    • SHA256

      766d3fb59f70107a4e8e3f1db393f01f6215e50d052161f41a0df9f626cebdc9

    • SHA512

      8d6e16cb3a0a13d85531d5a2dfbd3638c75c39605e22e0d92733291650fa79fc25ac8e98bc1c48215bdf2f21f2132fa95cba9cc2a51664072b46b262fcf4c878

    • SSDEEP

      6144:eQvoWvJakXxwvTygXUNVS4MGh1aBFrvz1xcxcWhUrt:eUTuyR1aBFrvz1xcxdUrt

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks