General

  • Target

    623f791513fd329a5313d7085612c2053117b182a7c03b9c94bbac6d123577d8

  • Size

    1.7MB

  • Sample

    230507-c7lexsgh3s

  • MD5

    680dc8a42d5503b769ea9f43e469b597

  • SHA1

    fb29f0814f2f4401ac899e06f24787ab5b66781e

  • SHA256

    623f791513fd329a5313d7085612c2053117b182a7c03b9c94bbac6d123577d8

  • SHA512

    fc549aa4fd145ca02beb5dd9e6dbc1e6936e939a82aaf6edc70f16eb1d0d83a7859a934fd991eb9b4a0d1e1bf6415663c2e81812a11d4a6d8e89fe0ae625e932

  • SSDEEP

    49152:fL2qzijpt/DgtySKSkaEMHGw4mbzpmV8i9T:dijn/stySsMmwTf0V8E

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

most

C2

185.161.248.73:4164

Attributes
  • auth_value

    7da4dfa153f2919e617aa016f7c36008

Targets

    • Target

      623f791513fd329a5313d7085612c2053117b182a7c03b9c94bbac6d123577d8

    • Size

      1.7MB

    • MD5

      680dc8a42d5503b769ea9f43e469b597

    • SHA1

      fb29f0814f2f4401ac899e06f24787ab5b66781e

    • SHA256

      623f791513fd329a5313d7085612c2053117b182a7c03b9c94bbac6d123577d8

    • SHA512

      fc549aa4fd145ca02beb5dd9e6dbc1e6936e939a82aaf6edc70f16eb1d0d83a7859a934fd991eb9b4a0d1e1bf6415663c2e81812a11d4a6d8e89fe0ae625e932

    • SSDEEP

      49152:fL2qzijpt/DgtySKSkaEMHGw4mbzpmV8i9T:dijn/stySsMmwTf0V8E

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks