General

  • Target

    7bbf28f9ee64569f2fd7523ec203f4f8ecafb3b0992a657d0bc63241df4c7b3d

  • Size

    308KB

  • Sample

    230608-rwjvaagg7x

  • MD5

    f343b75f2d01245864261c5bf1241a28

  • SHA1

    33c83e62ab430740030927e42947a511ff6b592c

  • SHA256

    7bbf28f9ee64569f2fd7523ec203f4f8ecafb3b0992a657d0bc63241df4c7b3d

  • SHA512

    151593edb932e37b975fea9f8e0170afc6ced0cd1d974895d56ae01577b65b7ce8c358040c2969be2ded627efc7d8aa677e591d8cd413f1b1baef94bb96b4e5a

  • SSDEEP

    6144:FJieERFHS2XwvTygXUNVS4MGh1aBFrvz1xcxcVtZP:FJYRAVyR1aBFrvz1xcxyZP

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      7bbf28f9ee64569f2fd7523ec203f4f8ecafb3b0992a657d0bc63241df4c7b3d

    • Size

      308KB

    • MD5

      f343b75f2d01245864261c5bf1241a28

    • SHA1

      33c83e62ab430740030927e42947a511ff6b592c

    • SHA256

      7bbf28f9ee64569f2fd7523ec203f4f8ecafb3b0992a657d0bc63241df4c7b3d

    • SHA512

      151593edb932e37b975fea9f8e0170afc6ced0cd1d974895d56ae01577b65b7ce8c358040c2969be2ded627efc7d8aa677e591d8cd413f1b1baef94bb96b4e5a

    • SSDEEP

      6144:FJieERFHS2XwvTygXUNVS4MGh1aBFrvz1xcxcVtZP:FJYRAVyR1aBFrvz1xcxyZP

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks