General

  • Target

    c6663c6d28444d720f6d22e55c2eb330162b1d9e2c99f535a8ff2747a702577d

  • Size

    308KB

  • Sample

    230608-sf2ktsha5v

  • MD5

    6c14c0a8756e542b5ad1f66fec2bf3c2

  • SHA1

    6fd947965ffea6eb47b870f860ef310d0f07c05f

  • SHA256

    c6663c6d28444d720f6d22e55c2eb330162b1d9e2c99f535a8ff2747a702577d

  • SHA512

    fbbeec180f62143413bcc0b297b855638cb114651570819666c5ef86f9222cfcd640a1cd0d2a7e2a7cedaec505fde604206777b3c41592325cc90006310fa310

  • SSDEEP

    6144:zJiekRFHWXwvTygXUNVS4MGh1aBFrvz1xcxcVtEP:zJ4RPyR1aBFrvz1xcxyEP

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      c6663c6d28444d720f6d22e55c2eb330162b1d9e2c99f535a8ff2747a702577d

    • Size

      308KB

    • MD5

      6c14c0a8756e542b5ad1f66fec2bf3c2

    • SHA1

      6fd947965ffea6eb47b870f860ef310d0f07c05f

    • SHA256

      c6663c6d28444d720f6d22e55c2eb330162b1d9e2c99f535a8ff2747a702577d

    • SHA512

      fbbeec180f62143413bcc0b297b855638cb114651570819666c5ef86f9222cfcd640a1cd0d2a7e2a7cedaec505fde604206777b3c41592325cc90006310fa310

    • SSDEEP

      6144:zJiekRFHWXwvTygXUNVS4MGh1aBFrvz1xcxcVtEP:zJ4RPyR1aBFrvz1xcxyEP

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks