General

  • Target

    711c6ec0df8a75228ea640aa14d259104b78a8e4ca116e178e2609261c145a9d.bin

  • Size

    1.2MB

  • Sample

    230507-dvf54sbf4t

  • MD5

    d96887d27fddd55b6bc9cca39e8a8c01

  • SHA1

    4f8b0b546788d376cfc3722a365b6125583d4de4

  • SHA256

    711c6ec0df8a75228ea640aa14d259104b78a8e4ca116e178e2609261c145a9d

  • SHA512

    5a42d68742e8f87c4be1a1ceece71426f6cf5b1d8e61edba8d2112e9b10080343ef3ccfa64c7ae1d902fb9800594d1766d7251ebf0e93384f8e25a1ebccea143

  • SSDEEP

    24576:5yxy+kRmJNCJPo9H7dvb6KkyY/TpQ3qK0u7lfdLh9DhRAkSUW93/aUE:sxyvMJNCho9H1bp87u6K5JhTzLo

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

life

C2

185.161.248.73:4164

Attributes
  • auth_value

    8685d11953530b68ad5ec703809d9f91

Targets

    • Target

      711c6ec0df8a75228ea640aa14d259104b78a8e4ca116e178e2609261c145a9d.bin

    • Size

      1.2MB

    • MD5

      d96887d27fddd55b6bc9cca39e8a8c01

    • SHA1

      4f8b0b546788d376cfc3722a365b6125583d4de4

    • SHA256

      711c6ec0df8a75228ea640aa14d259104b78a8e4ca116e178e2609261c145a9d

    • SHA512

      5a42d68742e8f87c4be1a1ceece71426f6cf5b1d8e61edba8d2112e9b10080343ef3ccfa64c7ae1d902fb9800594d1766d7251ebf0e93384f8e25a1ebccea143

    • SSDEEP

      24576:5yxy+kRmJNCJPo9H7dvb6KkyY/TpQ3qK0u7lfdLh9DhRAkSUW93/aUE:sxyvMJNCho9H1bp87u6K5JhTzLo

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks