General

  • Target

    36dd56842ecbb6d0150a648930e827371f0796e663b839d1ccfe184259e04789.exe

  • Size

    261KB

  • Sample

    250207-2av1ja1kfz

  • MD5

    18fe1c5649e00e62870fc9b2c6fcf62a

  • SHA1

    9048c912004fa26921681999c4e92109f96c9ede

  • SHA256

    36dd56842ecbb6d0150a648930e827371f0796e663b839d1ccfe184259e04789

  • SHA512

    9a5cb60f295a169ba7fccdf01c35b4a40b5303f8a2254a0eb0bcd1c02313c0267813289d9fe839540e6277dc848a170b149470123170051d4964ea0f651f5580

  • SSDEEP

    3072:WJhg7bWY1OhGO1RyHFaQ7RQ05CTEezbClXv8r8+oFe6gobFHFzA+E+2yQHcj/e:WvgOY1QqFaQ7W05AEezbMPZFzAy2yAj

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      36dd56842ecbb6d0150a648930e827371f0796e663b839d1ccfe184259e04789.exe

    • Size

      261KB

    • MD5

      18fe1c5649e00e62870fc9b2c6fcf62a

    • SHA1

      9048c912004fa26921681999c4e92109f96c9ede

    • SHA256

      36dd56842ecbb6d0150a648930e827371f0796e663b839d1ccfe184259e04789

    • SHA512

      9a5cb60f295a169ba7fccdf01c35b4a40b5303f8a2254a0eb0bcd1c02313c0267813289d9fe839540e6277dc848a170b149470123170051d4964ea0f651f5580

    • SSDEEP

      3072:WJhg7bWY1OhGO1RyHFaQ7RQ05CTEezbClXv8r8+oFe6gobFHFzA+E+2yQHcj/e:WvgOY1QqFaQ7W05AEezbMPZFzAy2yAj

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks