General

  • Target

    6597eea50c980401dd05dbee21124d8d8e5cdc14efe7042be3f36eb8e183565d.bin

  • Size

    957KB

  • Sample

    230506-17cpsabf73

  • MD5

    6cb7495b885c4e49edf6d1723606b5e8

  • SHA1

    fab11b8d42ef8fceef4a9c0075f77dfa1d5d5c92

  • SHA256

    6597eea50c980401dd05dbee21124d8d8e5cdc14efe7042be3f36eb8e183565d

  • SHA512

    cdf509d7592ed10276ed81fbbdc76455243b0e1360ac7d49f02c5572e7393fdd2befeff7a5d3ab67954ec9f7460afec1a24cc88b4978c833946641788d88e28c

  • SSDEEP

    24576:uyKLKO7c3znNkNqWEq+fiCIDMZ6xM95sLkHco6JP:9cZNqWEq+JIDMZ6QiLAco6

Malware Config

Extracted

Family

redline

Botnet

dark

C2

185.161.248.73:4164

Attributes
  • auth_value

    ae85b01f66afe8770afeed560513fc2d

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Targets

    • Target

      6597eea50c980401dd05dbee21124d8d8e5cdc14efe7042be3f36eb8e183565d.bin

    • Size

      957KB

    • MD5

      6cb7495b885c4e49edf6d1723606b5e8

    • SHA1

      fab11b8d42ef8fceef4a9c0075f77dfa1d5d5c92

    • SHA256

      6597eea50c980401dd05dbee21124d8d8e5cdc14efe7042be3f36eb8e183565d

    • SHA512

      cdf509d7592ed10276ed81fbbdc76455243b0e1360ac7d49f02c5572e7393fdd2befeff7a5d3ab67954ec9f7460afec1a24cc88b4978c833946641788d88e28c

    • SSDEEP

      24576:uyKLKO7c3znNkNqWEq+fiCIDMZ6xM95sLkHco6JP:9cZNqWEq+JIDMZ6QiLAco6

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks