General

  • Target

    5e784dbf73c43bedd9ea5f6781405ce22266934d84ec4b690c9700c8dbd9b0f3

  • Size

    282KB

  • Sample

    230608-gnbtlacg73

  • MD5

    9f7d5197ce9718e34758740d63744fb8

  • SHA1

    01e98ee3248f3feaa6532be6d879f8f1dc874b03

  • SHA256

    5e784dbf73c43bedd9ea5f6781405ce22266934d84ec4b690c9700c8dbd9b0f3

  • SHA512

    e26c751b00a2636f41a0ded86fdba3bb07cf0a7b6329f01f1048c6219761e14c310ad370b305fd9c18114bf6bb027ebc2c21a0416ea115697dcf7b972b18a359

  • SSDEEP

    6144:dQvoWvJu2CONwvTygXUNVS4MGh1aBFrvz1xcxcWhzrt:dUMnyR1aBFrvz1xcxdzrt

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      5e784dbf73c43bedd9ea5f6781405ce22266934d84ec4b690c9700c8dbd9b0f3

    • Size

      282KB

    • MD5

      9f7d5197ce9718e34758740d63744fb8

    • SHA1

      01e98ee3248f3feaa6532be6d879f8f1dc874b03

    • SHA256

      5e784dbf73c43bedd9ea5f6781405ce22266934d84ec4b690c9700c8dbd9b0f3

    • SHA512

      e26c751b00a2636f41a0ded86fdba3bb07cf0a7b6329f01f1048c6219761e14c310ad370b305fd9c18114bf6bb027ebc2c21a0416ea115697dcf7b972b18a359

    • SSDEEP

      6144:dQvoWvJu2CONwvTygXUNVS4MGh1aBFrvz1xcxcWhzrt:dUMnyR1aBFrvz1xcxdzrt

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks