General

  • Target

    14a2b73b30cc6c59947ef85ebbaaef992c06a2191c77d26b7cd1009478229726

  • Size

    282KB

  • Sample

    230608-gnpqfsdd3z

  • MD5

    a93918e45af86701394c47e564ff8f16

  • SHA1

    b279bbb81b007119c6c8a780b261ef58c962642d

  • SHA256

    14a2b73b30cc6c59947ef85ebbaaef992c06a2191c77d26b7cd1009478229726

  • SHA512

    dc9df3fd1d127d8fb2e610fdf6a62c3cbd2c0c978e754afd25aee0324081cda8462e40e61b82834f0bd18ecba859ae11b0b1cbb7c9a15b02827bc7831f71d6a0

  • SSDEEP

    6144:dQvoWvJu2CONwvTygXUNVS4MGh1aBFrvz1xcxcWhzrt:dUMnyR1aBFrvz1xcxdzrt

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      14a2b73b30cc6c59947ef85ebbaaef992c06a2191c77d26b7cd1009478229726

    • Size

      282KB

    • MD5

      a93918e45af86701394c47e564ff8f16

    • SHA1

      b279bbb81b007119c6c8a780b261ef58c962642d

    • SHA256

      14a2b73b30cc6c59947ef85ebbaaef992c06a2191c77d26b7cd1009478229726

    • SHA512

      dc9df3fd1d127d8fb2e610fdf6a62c3cbd2c0c978e754afd25aee0324081cda8462e40e61b82834f0bd18ecba859ae11b0b1cbb7c9a15b02827bc7831f71d6a0

    • SSDEEP

      6144:dQvoWvJu2CONwvTygXUNVS4MGh1aBFrvz1xcxcWhzrt:dUMnyR1aBFrvz1xcxdzrt

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks