General

  • Target

    3fa61dd7c580b74f43d9eb3e8cdd3bf383a9094231da0c2fa260f47eb45c312e.bin

  • Size

    1.2MB

  • Sample

    230506-1c6dlsgc87

  • MD5

    a04887f63c87b1fc49fba23a6a618f32

  • SHA1

    b0c18c3d82dd190f5a682915e8d96e1966164645

  • SHA256

    3fa61dd7c580b74f43d9eb3e8cdd3bf383a9094231da0c2fa260f47eb45c312e

  • SHA512

    b50debe01284e1b9940f67e465cdeb0aad60d6b1bb0c2807abf9a87267b721865f4a934fe8bc4c8c023d05edc24b3eb0b2c35216d64cae0f3784145f1203af88

  • SSDEEP

    24576:AyKZqiqb+i5/hk0wX21oKjmg/gnRWiNXOnfHhOSQL1:HliqdFwXEHIRWilO

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

life

C2

185.161.248.73:4164

Attributes
  • auth_value

    8685d11953530b68ad5ec703809d9f91

Targets

    • Target

      3fa61dd7c580b74f43d9eb3e8cdd3bf383a9094231da0c2fa260f47eb45c312e.bin

    • Size

      1.2MB

    • MD5

      a04887f63c87b1fc49fba23a6a618f32

    • SHA1

      b0c18c3d82dd190f5a682915e8d96e1966164645

    • SHA256

      3fa61dd7c580b74f43d9eb3e8cdd3bf383a9094231da0c2fa260f47eb45c312e

    • SHA512

      b50debe01284e1b9940f67e465cdeb0aad60d6b1bb0c2807abf9a87267b721865f4a934fe8bc4c8c023d05edc24b3eb0b2c35216d64cae0f3784145f1203af88

    • SSDEEP

      24576:AyKZqiqb+i5/hk0wX21oKjmg/gnRWiNXOnfHhOSQL1:HliqdFwXEHIRWilO

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks