General

  • Target

    8c45c173ae994970a1091f1fa03619f4afd05915551af061869bd18b1372cc4d

  • Size

    308KB

  • Sample

    230608-rkcxlafh97

  • MD5

    8598c3336cd63a9bc93e00a4f457a658

  • SHA1

    f5fdd21ede8a5477dace82b18f730eb222225807

  • SHA256

    8c45c173ae994970a1091f1fa03619f4afd05915551af061869bd18b1372cc4d

  • SHA512

    21d83165ed1908984687c9d69f60183d0070dcd1a4a4b496b930f24b65736b5b9da835325d1e7f8ac1028dc4289d4093a22b2341b5718e4e56fe64dd0631771f

  • SSDEEP

    6144:FJie0RFHCXwvTygXUNVS4MGh1aBFrvz1xcxcVtDP:FJoRDyR1aBFrvz1xcxyDP

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      8c45c173ae994970a1091f1fa03619f4afd05915551af061869bd18b1372cc4d

    • Size

      308KB

    • MD5

      8598c3336cd63a9bc93e00a4f457a658

    • SHA1

      f5fdd21ede8a5477dace82b18f730eb222225807

    • SHA256

      8c45c173ae994970a1091f1fa03619f4afd05915551af061869bd18b1372cc4d

    • SHA512

      21d83165ed1908984687c9d69f60183d0070dcd1a4a4b496b930f24b65736b5b9da835325d1e7f8ac1028dc4289d4093a22b2341b5718e4e56fe64dd0631771f

    • SSDEEP

      6144:FJie0RFHCXwvTygXUNVS4MGh1aBFrvz1xcxcVtDP:FJoRDyR1aBFrvz1xcxyDP

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks