General

  • Target

    4d7d181d421b0c6db82f832a1876af046e76ba8a47e17bf024e7ee6aea42b0ea

  • Size

    309KB

  • Sample

    230608-myh9baee27

  • MD5

    21fe9999a87fe1be77e91d909c5978ff

  • SHA1

    7c9267688f8053c009de95c86cace75d5b436ea9

  • SHA256

    4d7d181d421b0c6db82f832a1876af046e76ba8a47e17bf024e7ee6aea42b0ea

  • SHA512

    2f0016ddb9a8a0bab5e2bf4603574809bff636999857a50a51243d5d21df26ada745cf76e8de82412d5566bbea857f53055d3931876759b9a8d9e5e1ce5abba8

  • SSDEEP

    6144:YD5k3As3x2y6F4ZwvTygXUNVS4MGh1aBFrvz1xcxc7F0:YD2EytWyR1aBFrvz1xcxQ0

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      4d7d181d421b0c6db82f832a1876af046e76ba8a47e17bf024e7ee6aea42b0ea

    • Size

      309KB

    • MD5

      21fe9999a87fe1be77e91d909c5978ff

    • SHA1

      7c9267688f8053c009de95c86cace75d5b436ea9

    • SHA256

      4d7d181d421b0c6db82f832a1876af046e76ba8a47e17bf024e7ee6aea42b0ea

    • SHA512

      2f0016ddb9a8a0bab5e2bf4603574809bff636999857a50a51243d5d21df26ada745cf76e8de82412d5566bbea857f53055d3931876759b9a8d9e5e1ce5abba8

    • SSDEEP

      6144:YD5k3As3x2y6F4ZwvTygXUNVS4MGh1aBFrvz1xcxc7F0:YD2EytWyR1aBFrvz1xcxQ0

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks