General

  • Target

    f238e226ec724746408049e1835d0aa09844a4d8d543f54e5c0007cd4549a7cf

  • Size

    1.2MB

  • Sample

    230507-kc3pqaaf42

  • MD5

    e7da38c976f99b8c5668b5494699b860

  • SHA1

    2def7ad386fa7d223f16b5de876683efe3af8769

  • SHA256

    f238e226ec724746408049e1835d0aa09844a4d8d543f54e5c0007cd4549a7cf

  • SHA512

    09dd72a3ee2f12357c7e56cfecb962d3cd3b33f4b7a2b63f5e097f36bf6c96df40251c64b8b239ca1568f71e8e6759b1fa0a87adcfe34b4f3c361ac1e1766977

  • SSDEEP

    24576:JywMiHhUllw9L8W1KwM9wq3lNw6uzeo9zHD469nPNvI7Z0xxSB7D:8YHhUllw9TMJuq1OgohpnPNnzSB

Malware Config

Extracted

Family

redline

Botnet

lisa

C2

185.161.248.73:4164

Attributes
  • auth_value

    c2dc311db9820012377b054447d37949

Targets

    • Target

      f238e226ec724746408049e1835d0aa09844a4d8d543f54e5c0007cd4549a7cf

    • Size

      1.2MB

    • MD5

      e7da38c976f99b8c5668b5494699b860

    • SHA1

      2def7ad386fa7d223f16b5de876683efe3af8769

    • SHA256

      f238e226ec724746408049e1835d0aa09844a4d8d543f54e5c0007cd4549a7cf

    • SHA512

      09dd72a3ee2f12357c7e56cfecb962d3cd3b33f4b7a2b63f5e097f36bf6c96df40251c64b8b239ca1568f71e8e6759b1fa0a87adcfe34b4f3c361ac1e1766977

    • SSDEEP

      24576:JywMiHhUllw9L8W1KwM9wq3lNw6uzeo9zHD469nPNvI7Z0xxSB7D:8YHhUllw9TMJuq1OgohpnPNnzSB

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Tasks