General

  • Target

    f6787902c684fdd112a03f9ea9ed51034e1631cea03c5dd78e21ee9c582c4bda

  • Size

    308KB

  • Sample

    230608-wg88vahc86

  • MD5

    15b6ae4b1fc3282c29da2d378b7dfd68

  • SHA1

    03b6a223bb15f9f2b28f3364396de78b585da869

  • SHA256

    f6787902c684fdd112a03f9ea9ed51034e1631cea03c5dd78e21ee9c582c4bda

  • SHA512

    3bceb23ab426509be9bc59b93cde159329b847dceb2af5a6f1bc0b834be8456739f38fc3f0a97d9ba9947dfb150ac09a5bfebcfcc8453c570b23acd17370e8f4

  • SSDEEP

    6144:6JieERFH8dhpMnTDs7UNVS49kCNQSzrs5kLJhHVugiqtciLRc1tlP:6JYR+dQD7NQSzrs5kLJhHVugiqtciLR0

Malware Config

Extracted

Family

redline

Botnet

crazy

C2

83.97.73.129:19068

Attributes
  • auth_value

    66bc4d9682ea090eef64a299ece12fdd

Targets

    • Target

      f6787902c684fdd112a03f9ea9ed51034e1631cea03c5dd78e21ee9c582c4bda

    • Size

      308KB

    • MD5

      15b6ae4b1fc3282c29da2d378b7dfd68

    • SHA1

      03b6a223bb15f9f2b28f3364396de78b585da869

    • SHA256

      f6787902c684fdd112a03f9ea9ed51034e1631cea03c5dd78e21ee9c582c4bda

    • SHA512

      3bceb23ab426509be9bc59b93cde159329b847dceb2af5a6f1bc0b834be8456739f38fc3f0a97d9ba9947dfb150ac09a5bfebcfcc8453c570b23acd17370e8f4

    • SSDEEP

      6144:6JieERFH8dhpMnTDs7UNVS49kCNQSzrs5kLJhHVugiqtciLRc1tlP:6JYR+dQD7NQSzrs5kLJhHVugiqtciLR0

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks