General

  • Target

    eb415f4964d349a58c0c5923fa294dd2c7c334b89f9a3d7a51ded78185d3120a.bin

  • Size

    1.7MB

  • Sample

    230501-xn1eysef93

  • MD5

    120d8b080b5a80335b72b138bd99bbcb

  • SHA1

    69a11d22775f3efe990fe1036c73fc1774455e72

  • SHA256

    eb415f4964d349a58c0c5923fa294dd2c7c334b89f9a3d7a51ded78185d3120a

  • SHA512

    a8bc4084ca7a92d60c9722eb9f0d375482c6ae0d9f39a0a6a672b3ab1e54439f699941c65690d8272b94bd7472fe3cc747269a6cd7a15cf3f4e2b5bacd5d6826

  • SSDEEP

    49152:px8Jw6eBQvYM3ta3zNRH4Zv1n8dkY4ODicUYkxyDD:kzvxta3z4ZfXfyDD

Malware Config

Extracted

Family

redline

Botnet

most

C2

185.161.248.73:4164

Attributes
  • auth_value

    7da4dfa153f2919e617aa016f7c36008

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Targets

    • Target

      eb415f4964d349a58c0c5923fa294dd2c7c334b89f9a3d7a51ded78185d3120a.bin

    • Size

      1.7MB

    • MD5

      120d8b080b5a80335b72b138bd99bbcb

    • SHA1

      69a11d22775f3efe990fe1036c73fc1774455e72

    • SHA256

      eb415f4964d349a58c0c5923fa294dd2c7c334b89f9a3d7a51ded78185d3120a

    • SHA512

      a8bc4084ca7a92d60c9722eb9f0d375482c6ae0d9f39a0a6a672b3ab1e54439f699941c65690d8272b94bd7472fe3cc747269a6cd7a15cf3f4e2b5bacd5d6826

    • SSDEEP

      49152:px8Jw6eBQvYM3ta3zNRH4Zv1n8dkY4ODicUYkxyDD:kzvxta3z4ZfXfyDD

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks