General

  • Target

    0228ba189235870b0e4183afdd773dcd0c13adba52cfef710757972facdeaf93

  • Size

    308KB

  • Sample

    230608-sdj8rsgc55

  • MD5

    651786463ed38b52f4705ef8f0c76062

  • SHA1

    f8a25b8766ec66ccbb9022757d0fe75fd3b76b61

  • SHA256

    0228ba189235870b0e4183afdd773dcd0c13adba52cfef710757972facdeaf93

  • SHA512

    cf9281f8037955f94f9dc16793ca7d7f9e06a26dab542c207ffdf18dc2cdec2dbdca43826e5bfff9832f3c801e46ca0b4985e38e4c227751e8f577ead5bcab8b

  • SSDEEP

    6144:zJieURFHllXwvTygXUNVS4MGh1aBFrvz1xcxcVtPP:zJIRCyR1aBFrvz1xcxyPP

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      0228ba189235870b0e4183afdd773dcd0c13adba52cfef710757972facdeaf93

    • Size

      308KB

    • MD5

      651786463ed38b52f4705ef8f0c76062

    • SHA1

      f8a25b8766ec66ccbb9022757d0fe75fd3b76b61

    • SHA256

      0228ba189235870b0e4183afdd773dcd0c13adba52cfef710757972facdeaf93

    • SHA512

      cf9281f8037955f94f9dc16793ca7d7f9e06a26dab542c207ffdf18dc2cdec2dbdca43826e5bfff9832f3c801e46ca0b4985e38e4c227751e8f577ead5bcab8b

    • SSDEEP

      6144:zJieURFHllXwvTygXUNVS4MGh1aBFrvz1xcxcVtPP:zJIRCyR1aBFrvz1xcxyPP

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks