General

  • Target

    2fd79bc6062abe998876592ebcb3ebb2a26e2aa04b137e2805d8b6bfb99e42ee.bin

  • Size

    1.5MB

  • Sample

    230506-z2b1maeh88

  • MD5

    4a12e7aba856446b79797cc4a39caf84

  • SHA1

    06b39dafd016c5dedab47c3b2d7d3a64975fe159

  • SHA256

    2fd79bc6062abe998876592ebcb3ebb2a26e2aa04b137e2805d8b6bfb99e42ee

  • SHA512

    dbceb750de24655d22b7214f14687a27e9e0adb9d2a3b1950a39999b95563558a1cae590df28a238e4b41d56c6dbab81c12c372bd7066be6a17e8ee73e90f1c7

  • SSDEEP

    49152:Vmlbnd3VBKnqMttVUvHh2jGpsoSfFMRLnkcfnOqxro:edFBwPttVRaB1kc2qxro

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

most

C2

185.161.248.73:4164

Attributes
  • auth_value

    7da4dfa153f2919e617aa016f7c36008

Targets

    • Target

      2fd79bc6062abe998876592ebcb3ebb2a26e2aa04b137e2805d8b6bfb99e42ee.bin

    • Size

      1.5MB

    • MD5

      4a12e7aba856446b79797cc4a39caf84

    • SHA1

      06b39dafd016c5dedab47c3b2d7d3a64975fe159

    • SHA256

      2fd79bc6062abe998876592ebcb3ebb2a26e2aa04b137e2805d8b6bfb99e42ee

    • SHA512

      dbceb750de24655d22b7214f14687a27e9e0adb9d2a3b1950a39999b95563558a1cae590df28a238e4b41d56c6dbab81c12c372bd7066be6a17e8ee73e90f1c7

    • SSDEEP

      49152:Vmlbnd3VBKnqMttVUvHh2jGpsoSfFMRLnkcfnOqxro:edFBwPttVRaB1kc2qxro

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks