General

  • Target

    61f979c3cc609820bd8061f559de11f58d550e4d3f7c603b325266bd9a7c8aa5

  • Size

    782KB

  • Sample

    230507-c65geagg7v

  • MD5

    bb34463a68849937cee62d3b9bb59f95

  • SHA1

    d32a706d2f94638862680bb56742ff84e0b13f80

  • SHA256

    61f979c3cc609820bd8061f559de11f58d550e4d3f7c603b325266bd9a7c8aa5

  • SHA512

    d0e3c797bc484e48b6d716625601f1193cbb3f550412ddad6fd3d032fc0916a8c5dbadfce31364f1fdc375092f3435c2f7409f1f5caddd23225f5daf5f7be745

  • SSDEEP

    12288:ay90w4b4H5WPQWm5vwsmQIOV+ei+f46MM9G9zClqZhW2wF/M580/aaKVmv2OcDpi:ayvo4IP4lwJbYVMp9vW2wmmaV2doVx

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dark

C2

185.161.248.73:4164

Attributes
  • auth_value

    ae85b01f66afe8770afeed560513fc2d

Targets

    • Target

      61f979c3cc609820bd8061f559de11f58d550e4d3f7c603b325266bd9a7c8aa5

    • Size

      782KB

    • MD5

      bb34463a68849937cee62d3b9bb59f95

    • SHA1

      d32a706d2f94638862680bb56742ff84e0b13f80

    • SHA256

      61f979c3cc609820bd8061f559de11f58d550e4d3f7c603b325266bd9a7c8aa5

    • SHA512

      d0e3c797bc484e48b6d716625601f1193cbb3f550412ddad6fd3d032fc0916a8c5dbadfce31364f1fdc375092f3435c2f7409f1f5caddd23225f5daf5f7be745

    • SSDEEP

      12288:ay90w4b4H5WPQWm5vwsmQIOV+ei+f46MM9G9zClqZhW2wF/M580/aaKVmv2OcDpi:ayvo4IP4lwJbYVMp9vW2wmmaV2doVx

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks