General

  • Target

    e1c98e7718093eb08119ebeef4b93fe75e639e81134d210d72d0fb52f5cf5d23.bin

  • Size

    1.2MB

  • Sample

    230505-ywqfdsdh2y

  • MD5

    38a0407c2c1731f4fb4494a08ee5195a

  • SHA1

    416f0c7748dd1dea0085b22e47d9122ff6f6cbb8

  • SHA256

    e1c98e7718093eb08119ebeef4b93fe75e639e81134d210d72d0fb52f5cf5d23

  • SHA512

    4a701020b05017608407936911fdbc3839088579765eed7626ccb4c9a05be76fb6b07bdab79cd0d222525c713cc758eb30eb188dbb577a4de0daee11a06b3313

  • SSDEEP

    24576:pymwRekLcGN1qNeCkGDWutJSsJRCtuZnOYofyiZM6EDzdmU:clRevQqU4LvR4KyY6E

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

life

C2

185.161.248.73:4164

Attributes
  • auth_value

    8685d11953530b68ad5ec703809d9f91

Targets

    • Target

      e1c98e7718093eb08119ebeef4b93fe75e639e81134d210d72d0fb52f5cf5d23.bin

    • Size

      1.2MB

    • MD5

      38a0407c2c1731f4fb4494a08ee5195a

    • SHA1

      416f0c7748dd1dea0085b22e47d9122ff6f6cbb8

    • SHA256

      e1c98e7718093eb08119ebeef4b93fe75e639e81134d210d72d0fb52f5cf5d23

    • SHA512

      4a701020b05017608407936911fdbc3839088579765eed7626ccb4c9a05be76fb6b07bdab79cd0d222525c713cc758eb30eb188dbb577a4de0daee11a06b3313

    • SSDEEP

      24576:pymwRekLcGN1qNeCkGDWutJSsJRCtuZnOYofyiZM6EDzdmU:clRevQqU4LvR4KyY6E

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks