General

  • Target

    12443f6c8868eff28475904f6c24a37dd5b9ee370e626474ac6bbd43d6ea0ed8

  • Size

    309KB

  • Sample

    230608-p65tdsfe28

  • MD5

    af298b02a2c085fe41f95c6d6511c271

  • SHA1

    7150834cb42d905ef94b7adeb7bd19ce552d167d

  • SHA256

    12443f6c8868eff28475904f6c24a37dd5b9ee370e626474ac6bbd43d6ea0ed8

  • SHA512

    5fdc353dceb749ef9d7ac87a0a4facb0bb15ae7c2ee91cf7ae292ac9707cbfa2d48cbe665798a3d424dead63d15d84cb245333e9e4bcc383c7a03c4b0842fc60

  • SSDEEP

    6144:SD5k3As3xGy6FGAwvTygXUNVS4MGh1aBFrvz1xcxc730:SD20yT3yR1aBFrvz1xcxO0

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      12443f6c8868eff28475904f6c24a37dd5b9ee370e626474ac6bbd43d6ea0ed8

    • Size

      309KB

    • MD5

      af298b02a2c085fe41f95c6d6511c271

    • SHA1

      7150834cb42d905ef94b7adeb7bd19ce552d167d

    • SHA256

      12443f6c8868eff28475904f6c24a37dd5b9ee370e626474ac6bbd43d6ea0ed8

    • SHA512

      5fdc353dceb749ef9d7ac87a0a4facb0bb15ae7c2ee91cf7ae292ac9707cbfa2d48cbe665798a3d424dead63d15d84cb245333e9e4bcc383c7a03c4b0842fc60

    • SSDEEP

      6144:SD5k3As3xGy6FGAwvTygXUNVS4MGh1aBFrvz1xcxc730:SD20yT3yR1aBFrvz1xcxO0

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks