General

  • Target

    60a28689b00f56c7b1be1f893655711fb3a224add70d9e33a7623f05879e50d6.bin

  • Size

    913KB

  • Sample

    230506-131aaabb83

  • MD5

    5daf97ba89d7bed2c23a92dd9e0d571d

  • SHA1

    ff37fe01e24b8302ef2a2337e08557b194e334b7

  • SHA256

    60a28689b00f56c7b1be1f893655711fb3a224add70d9e33a7623f05879e50d6

  • SHA512

    e1d305d57cf69631ab628874e63efdc869f72c12e17b740a0a2255dc46fc5b57635b0b5ea0debd127385b4cd6acb37ba172fa826c0b03db08431acf497cdbad8

  • SSDEEP

    24576:XyiB4WZhteQ1mwwzmqKE7ZxcVa3sWkHxQdg+:iGLtX1mwKmqKE7Zx38WAGd

Malware Config

Extracted

Family

redline

Botnet

dark

C2

185.161.248.73:4164

Attributes
  • auth_value

    ae85b01f66afe8770afeed560513fc2d

Targets

    • Target

      60a28689b00f56c7b1be1f893655711fb3a224add70d9e33a7623f05879e50d6.bin

    • Size

      913KB

    • MD5

      5daf97ba89d7bed2c23a92dd9e0d571d

    • SHA1

      ff37fe01e24b8302ef2a2337e08557b194e334b7

    • SHA256

      60a28689b00f56c7b1be1f893655711fb3a224add70d9e33a7623f05879e50d6

    • SHA512

      e1d305d57cf69631ab628874e63efdc869f72c12e17b740a0a2255dc46fc5b57635b0b5ea0debd127385b4cd6acb37ba172fa826c0b03db08431acf497cdbad8

    • SSDEEP

      24576:XyiB4WZhteQ1mwwzmqKE7ZxcVa3sWkHxQdg+:iGLtX1mwKmqKE7Zx38WAGd

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks