General

  • Target

    df2947e35225982827666388ef976cc3efe4e1e188dcdb321a894ce1b35ef1d4.bin

  • Size

    1.2MB

  • Sample

    230505-ysx13ade9v

  • MD5

    2010af0387b54036e58304327151cd5c

  • SHA1

    72027ceabb45d6997202fd3e2f799158c7fec13e

  • SHA256

    df2947e35225982827666388ef976cc3efe4e1e188dcdb321a894ce1b35ef1d4

  • SHA512

    1c4a2cb4bdd3fad6343bd34b33d6c8f2812da43f66a24c75423f4e3de1a24422769ed8a81a485513438a98827a88dc20d14674dc9c72985ebf7370d376586c7c

  • SSDEEP

    24576:vyiYai7uipAJSOEuuIlXR4AAOoK3A7Iaj3y3vFY+EkTSXqqVXjRJZtx:6ivitqrEheXD5rm3yukTSXqGJb

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

life

C2

185.161.248.73:4164

Attributes
  • auth_value

    8685d11953530b68ad5ec703809d9f91

Targets

    • Target

      df2947e35225982827666388ef976cc3efe4e1e188dcdb321a894ce1b35ef1d4.bin

    • Size

      1.2MB

    • MD5

      2010af0387b54036e58304327151cd5c

    • SHA1

      72027ceabb45d6997202fd3e2f799158c7fec13e

    • SHA256

      df2947e35225982827666388ef976cc3efe4e1e188dcdb321a894ce1b35ef1d4

    • SHA512

      1c4a2cb4bdd3fad6343bd34b33d6c8f2812da43f66a24c75423f4e3de1a24422769ed8a81a485513438a98827a88dc20d14674dc9c72985ebf7370d376586c7c

    • SSDEEP

      24576:vyiYai7uipAJSOEuuIlXR4AAOoK3A7Iaj3y3vFY+EkTSXqqVXjRJZtx:6ivitqrEheXD5rm3yukTSXqGJb

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks