General

  • Target

    c3adcbe3f816a7f53dd99127914209c8e226454b92022b35eed2653ae8c42845

  • Size

    308KB

  • Sample

    230608-rl9mysgf9z

  • MD5

    51e0fc99a7e44a309f49001874709c23

  • SHA1

    530fe2107877bd3fbf1b5cd81653a1a2ebccd718

  • SHA256

    c3adcbe3f816a7f53dd99127914209c8e226454b92022b35eed2653ae8c42845

  • SHA512

    5f1c85d882b8c1d431a1002aff38c5cfa0ab9a9810eba9b293c0ee5cf08046a97235a85f802551c511c82dc1d8d78923a27c86ca5c8c3e1ddbf8d6c3a2b3a24f

  • SSDEEP

    6144:FJie0RFHCXwvTygXUNVS4MGh1aBFrvz1xcxcVtDP:FJoRDyR1aBFrvz1xcxyDP

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      c3adcbe3f816a7f53dd99127914209c8e226454b92022b35eed2653ae8c42845

    • Size

      308KB

    • MD5

      51e0fc99a7e44a309f49001874709c23

    • SHA1

      530fe2107877bd3fbf1b5cd81653a1a2ebccd718

    • SHA256

      c3adcbe3f816a7f53dd99127914209c8e226454b92022b35eed2653ae8c42845

    • SHA512

      5f1c85d882b8c1d431a1002aff38c5cfa0ab9a9810eba9b293c0ee5cf08046a97235a85f802551c511c82dc1d8d78923a27c86ca5c8c3e1ddbf8d6c3a2b3a24f

    • SSDEEP

      6144:FJie0RFHCXwvTygXUNVS4MGh1aBFrvz1xcxcVtDP:FJoRDyR1aBFrvz1xcxyDP

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks