General

  • Target

    903f7c941dba6b00cf7b88ecc2860548e2016559bf9e9cd3fc49ddcde8700a97

  • Size

    282KB

  • Sample

    230608-glvhxsdc9y

  • MD5

    e9e18405be54b4add27a38f25326d070

  • SHA1

    7e67de4cde5c80677abe4b098abf3b902d1a0216

  • SHA256

    903f7c941dba6b00cf7b88ecc2860548e2016559bf9e9cd3fc49ddcde8700a97

  • SHA512

    c9fa376345b524fcc739a195e88a0ce1471011751f4185c0f7c1d16094d5589ee584a57e7d861bf52bae176a8ef7f46e015b25e1de5f30938ded7c606efcab99

  • SSDEEP

    6144:dQvoWvJu2CONwvTygXUNVS4MGh1aBFrvz1xcxcWhzrt:dUMnyR1aBFrvz1xcxdzrt

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      903f7c941dba6b00cf7b88ecc2860548e2016559bf9e9cd3fc49ddcde8700a97

    • Size

      282KB

    • MD5

      e9e18405be54b4add27a38f25326d070

    • SHA1

      7e67de4cde5c80677abe4b098abf3b902d1a0216

    • SHA256

      903f7c941dba6b00cf7b88ecc2860548e2016559bf9e9cd3fc49ddcde8700a97

    • SHA512

      c9fa376345b524fcc739a195e88a0ce1471011751f4185c0f7c1d16094d5589ee584a57e7d861bf52bae176a8ef7f46e015b25e1de5f30938ded7c606efcab99

    • SSDEEP

      6144:dQvoWvJu2CONwvTygXUNVS4MGh1aBFrvz1xcxcWhzrt:dUMnyR1aBFrvz1xcxdzrt

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks