General

  • Target

    6175182834a0bcb720db309c3429b141a36326012291b5c58ebb9a843dbab010

  • Size

    1.7MB

  • Sample

    230507-c6ewragf9s

  • MD5

    6f1fdd139976ec413cf4e3191eaf7ebf

  • SHA1

    48839de08d979f969177f3912cb329026398d85c

  • SHA256

    6175182834a0bcb720db309c3429b141a36326012291b5c58ebb9a843dbab010

  • SHA512

    62bf266e8396ce4da0bd8615d80f7270ce56a4b15add2a7ad229cdabcf8dca08f6bd9ba8670d0be03e0c4b5a151152ef58a39f6b121c62dcd719b4398a9b94de

  • SSDEEP

    24576:NyvVYT8C9DpuBMcJD0zt7MKeU0hGFY9pd5v1EUX9tQ0BdTBA85pTuszH:ovsbp0McDQtYK0hgkr7g0Dp5T

Malware Config

Extracted

Family

redline

Botnet

most

C2

185.161.248.73:4164

Attributes
  • auth_value

    7da4dfa153f2919e617aa016f7c36008

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Targets

    • Target

      6175182834a0bcb720db309c3429b141a36326012291b5c58ebb9a843dbab010

    • Size

      1.7MB

    • MD5

      6f1fdd139976ec413cf4e3191eaf7ebf

    • SHA1

      48839de08d979f969177f3912cb329026398d85c

    • SHA256

      6175182834a0bcb720db309c3429b141a36326012291b5c58ebb9a843dbab010

    • SHA512

      62bf266e8396ce4da0bd8615d80f7270ce56a4b15add2a7ad229cdabcf8dca08f6bd9ba8670d0be03e0c4b5a151152ef58a39f6b121c62dcd719b4398a9b94de

    • SSDEEP

      24576:NyvVYT8C9DpuBMcJD0zt7MKeU0hGFY9pd5v1EUX9tQ0BdTBA85pTuszH:ovsbp0McDQtYK0hgkr7g0Dp5T

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks