General

  • Target

    83444b8034c23a1178ab3f8a8025cd87292760cb549847331e4dd8ec444af05d

  • Size

    308KB

  • Sample

    230608-r8tj9agb89

  • MD5

    6d1c577203c6e02d2ce5db8722e29d47

  • SHA1

    ddbb8eae07460c31fd7ad44ce8aa1756b6dc3f24

  • SHA256

    83444b8034c23a1178ab3f8a8025cd87292760cb549847331e4dd8ec444af05d

  • SHA512

    7b757735461fc1dc4542068c5f45befab768b3d3040aae2f98eb1409bb8273ee359c44aec9810286291f5765b2ba012dbde23f1a2d95d68e6b2f3410a81ced5a

  • SSDEEP

    6144:aJiekRFHLXwvTygXUNVS4MGh1aBFrvz1xcxcVtEP:aJ4RCyR1aBFrvz1xcxyEP

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      83444b8034c23a1178ab3f8a8025cd87292760cb549847331e4dd8ec444af05d

    • Size

      308KB

    • MD5

      6d1c577203c6e02d2ce5db8722e29d47

    • SHA1

      ddbb8eae07460c31fd7ad44ce8aa1756b6dc3f24

    • SHA256

      83444b8034c23a1178ab3f8a8025cd87292760cb549847331e4dd8ec444af05d

    • SHA512

      7b757735461fc1dc4542068c5f45befab768b3d3040aae2f98eb1409bb8273ee359c44aec9810286291f5765b2ba012dbde23f1a2d95d68e6b2f3410a81ced5a

    • SSDEEP

      6144:aJiekRFHLXwvTygXUNVS4MGh1aBFrvz1xcxcVtEP:aJ4RCyR1aBFrvz1xcxyEP

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks