General

  • Target

    d81f903d275509235d8643b4182e1065ab5aef14580f46522477fd1b40ca2fcc.bin

  • Size

    783KB

  • Sample

    230505-ymanksda41

  • MD5

    cf069439bfd4e1b10147cc8187594b52

  • SHA1

    5a80a46fb2b5dc7f87fb98dc0b4a0d41633af892

  • SHA256

    d81f903d275509235d8643b4182e1065ab5aef14580f46522477fd1b40ca2fcc

  • SHA512

    73299926b610e59f3809810f1a46f639adf6914fad831320933aea1b84866dfa352a1d60ffa30b9ebdd7d1ece2f27124cbe03415971159382bdc4c514aebe2ad

  • SSDEEP

    24576:4yHzwqRz8L4HrItCH/26PkNKhz3ggpGsv4Sjqxei:/T904HrqCHOYkNQz31v4Sux

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dark

C2

185.161.248.73:4164

Attributes
  • auth_value

    ae85b01f66afe8770afeed560513fc2d

Targets

    • Target

      d81f903d275509235d8643b4182e1065ab5aef14580f46522477fd1b40ca2fcc.bin

    • Size

      783KB

    • MD5

      cf069439bfd4e1b10147cc8187594b52

    • SHA1

      5a80a46fb2b5dc7f87fb98dc0b4a0d41633af892

    • SHA256

      d81f903d275509235d8643b4182e1065ab5aef14580f46522477fd1b40ca2fcc

    • SHA512

      73299926b610e59f3809810f1a46f639adf6914fad831320933aea1b84866dfa352a1d60ffa30b9ebdd7d1ece2f27124cbe03415971159382bdc4c514aebe2ad

    • SSDEEP

      24576:4yHzwqRz8L4HrItCH/26PkNKhz3ggpGsv4Sjqxei:/T904HrqCHOYkNQz31v4Sux

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks