General

  • Target

    ae62ffff4d178aa8a05b08d9c2e8d92227d2f255a4fd4f027319feeec36fef1b

  • Size

    309KB

  • Sample

    230608-lafylseb31

  • MD5

    ec16cca757d4617af6bdda30f4e6d478

  • SHA1

    5cdd7877b07b1f31d3533af833cb8fcb4a681f0b

  • SHA256

    ae62ffff4d178aa8a05b08d9c2e8d92227d2f255a4fd4f027319feeec36fef1b

  • SHA512

    f2854060db85d5ff59853e988a7341f77578fda16bc9464a35c375fde02d6e588b57becf3a34ee4af3994374c0e17d4f697da381b6ce773b321e7c73f486cb92

  • SSDEEP

    6144:vD5k3As3xmy6F8hwvTygXUNVS4MGh1aBFrvz1xcxc720R:vD2UyDuyR1aBFrvz1xcxn0R

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      ae62ffff4d178aa8a05b08d9c2e8d92227d2f255a4fd4f027319feeec36fef1b

    • Size

      309KB

    • MD5

      ec16cca757d4617af6bdda30f4e6d478

    • SHA1

      5cdd7877b07b1f31d3533af833cb8fcb4a681f0b

    • SHA256

      ae62ffff4d178aa8a05b08d9c2e8d92227d2f255a4fd4f027319feeec36fef1b

    • SHA512

      f2854060db85d5ff59853e988a7341f77578fda16bc9464a35c375fde02d6e588b57becf3a34ee4af3994374c0e17d4f697da381b6ce773b321e7c73f486cb92

    • SSDEEP

      6144:vD5k3As3xmy6F8hwvTygXUNVS4MGh1aBFrvz1xcxc720R:vD2UyDuyR1aBFrvz1xcxn0R

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks