General

  • Target

    03df6802937852da6e6165553adaea068255d5c04b21883301f82d62312e3e18.bin

  • Size

    1.7MB

  • Sample

    230506-2kkybadc57

  • MD5

    fe46f0490e4931e428ff10e8c45e5672

  • SHA1

    d22ddf53f8964ecf998dbd91a24a8683458f3600

  • SHA256

    03df6802937852da6e6165553adaea068255d5c04b21883301f82d62312e3e18

  • SHA512

    747b7aaf8677cc7747dae0a1d9ac0119bdb3dd3f401975e9b4d2de04940ffe3fc97b84be35d23073da50af1fbcad5291d9972c193b88f0b436da163772280f44

  • SSDEEP

    49152:9K/qfe4rC3OfoOzcUutdZk1OBgukTacs2YWJe7yMm0:ESfe4rC3OwH/tdZk1OBD3cJJe7ym

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

most

C2

185.161.248.73:4164

Attributes
  • auth_value

    7da4dfa153f2919e617aa016f7c36008

Targets

    • Target

      03df6802937852da6e6165553adaea068255d5c04b21883301f82d62312e3e18.bin

    • Size

      1.7MB

    • MD5

      fe46f0490e4931e428ff10e8c45e5672

    • SHA1

      d22ddf53f8964ecf998dbd91a24a8683458f3600

    • SHA256

      03df6802937852da6e6165553adaea068255d5c04b21883301f82d62312e3e18

    • SHA512

      747b7aaf8677cc7747dae0a1d9ac0119bdb3dd3f401975e9b4d2de04940ffe3fc97b84be35d23073da50af1fbcad5291d9972c193b88f0b436da163772280f44

    • SSDEEP

      49152:9K/qfe4rC3OfoOzcUutdZk1OBgukTacs2YWJe7yMm0:ESfe4rC3OwH/tdZk1OBD3cJJe7ym

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks