General

  • Target

    f936c76eeea232cd7684c10a3351d21254313ee0e828bdd1198924494bcf712a

  • Size

    282KB

  • Sample

    230608-gh87xadc7w

  • MD5

    a59a3349634a37931f5a0355c7fe8ac3

  • SHA1

    1ed82d723ffe9606f7629e13a44e94eb399ad13c

  • SHA256

    f936c76eeea232cd7684c10a3351d21254313ee0e828bdd1198924494bcf712a

  • SHA512

    a6e9122a947a8e442c37e7f701ba8984384583bf919ec093ee6e0b85cdfa6462c154e3ad86bb2412af650577051ce5fa4ca051f325407a609c91684d5f9a399e

  • SSDEEP

    6144:NQvoWvJ0y0qwvTygXUNVS4MGh1aBFrvz1xcxcWhwrt:NUZ8yR1aBFrvz1xcxdwrt

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      f936c76eeea232cd7684c10a3351d21254313ee0e828bdd1198924494bcf712a

    • Size

      282KB

    • MD5

      a59a3349634a37931f5a0355c7fe8ac3

    • SHA1

      1ed82d723ffe9606f7629e13a44e94eb399ad13c

    • SHA256

      f936c76eeea232cd7684c10a3351d21254313ee0e828bdd1198924494bcf712a

    • SHA512

      a6e9122a947a8e442c37e7f701ba8984384583bf919ec093ee6e0b85cdfa6462c154e3ad86bb2412af650577051ce5fa4ca051f325407a609c91684d5f9a399e

    • SSDEEP

      6144:NQvoWvJ0y0qwvTygXUNVS4MGh1aBFrvz1xcxcWhwrt:NUZ8yR1aBFrvz1xcxdwrt

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks