General

  • Target

    a8e41619e99f183455d2e4ab86dcf15c37bfc41befc193b1ffa7f13b9740532f.bin

  • Size

    1.7MB

  • Sample

    230505-xjjxeahc3x

  • MD5

    7e8d316f561eec5e5f9f2172b00b55b8

  • SHA1

    2173301452d68a871ef60abae989a0d16c782e82

  • SHA256

    a8e41619e99f183455d2e4ab86dcf15c37bfc41befc193b1ffa7f13b9740532f

  • SHA512

    02e28bd0f4b8939604162d2ace05489701669a7e5fcf6f88276e448f075d368da9e6467b7e81dc753dea0c700fabdb4462005f442522a108482f8f80e81131a6

  • SSDEEP

    49152:dDHj3sshXctkM3323u26bk/nIrXUkZ9W1oi:hDDhMtkAEEk/IAkqi

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

most

C2

185.161.248.73:4164

Attributes
  • auth_value

    7da4dfa153f2919e617aa016f7c36008

Targets

    • Target

      a8e41619e99f183455d2e4ab86dcf15c37bfc41befc193b1ffa7f13b9740532f.bin

    • Size

      1.7MB

    • MD5

      7e8d316f561eec5e5f9f2172b00b55b8

    • SHA1

      2173301452d68a871ef60abae989a0d16c782e82

    • SHA256

      a8e41619e99f183455d2e4ab86dcf15c37bfc41befc193b1ffa7f13b9740532f

    • SHA512

      02e28bd0f4b8939604162d2ace05489701669a7e5fcf6f88276e448f075d368da9e6467b7e81dc753dea0c700fabdb4462005f442522a108482f8f80e81131a6

    • SSDEEP

      49152:dDHj3sshXctkM3323u26bk/nIrXUkZ9W1oi:hDDhMtkAEEk/IAkqi

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks