General

  • Target

    915bd90b362beb040216054eff714fbd54fa700f25f9912fde53c4bd0076ff9b

  • Size

    309KB

  • Sample

    230608-kwef8sdh7w

  • MD5

    bb0e354b8b79f04a5994cba1422a9ea8

  • SHA1

    e40e4b3510cb759db492ceef144e1f62ba22a804

  • SHA256

    915bd90b362beb040216054eff714fbd54fa700f25f9912fde53c4bd0076ff9b

  • SHA512

    65037478a69d063d970eec9fc4970bfeef71f6f8a91ade022d66cd498e9146e22045de7dc66da843749d1dfb5fee5742d77bd3a37d785f963aa6e623bf768085

  • SSDEEP

    6144:4D5k3As3xWy6FUOIwvTygXUNVS4MGh1aBFrvz1xcxc7d0:4D2kyLOvyR1aBFrvz1xcxg0

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      915bd90b362beb040216054eff714fbd54fa700f25f9912fde53c4bd0076ff9b

    • Size

      309KB

    • MD5

      bb0e354b8b79f04a5994cba1422a9ea8

    • SHA1

      e40e4b3510cb759db492ceef144e1f62ba22a804

    • SHA256

      915bd90b362beb040216054eff714fbd54fa700f25f9912fde53c4bd0076ff9b

    • SHA512

      65037478a69d063d970eec9fc4970bfeef71f6f8a91ade022d66cd498e9146e22045de7dc66da843749d1dfb5fee5742d77bd3a37d785f963aa6e623bf768085

    • SSDEEP

      6144:4D5k3As3xWy6FUOIwvTygXUNVS4MGh1aBFrvz1xcxc7d0:4D2kyLOvyR1aBFrvz1xcxg0

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks