General

  • Target

    faed29eb766db600961f9423a479f19c7d4d64724814e28d73b0502d520d7033

  • Size

    851KB

  • Sample

    230507-kpxdgacb84

  • MD5

    0790baaf9bbcb07269d4dc0d035dd66f

  • SHA1

    b3ef4b950f79283490c547813f97ff23a878a1d2

  • SHA256

    faed29eb766db600961f9423a479f19c7d4d64724814e28d73b0502d520d7033

  • SHA512

    b442da8418870b6f51b62849eb41802d2e144e309fd3e7dc215adf302af3e5ac08a1bf6db916836df74ff6501cb0c090e54fe7b45777059d242ab4c0314436ee

  • SSDEEP

    12288:8y90dQ8Zi3+uGRofOv6FIVppH/QBC+NE7k7N96NBnGP+J3huywkFBh4igIfKkTeX:8yR8c3NGSmv4IV//QBS+9w6+qiX4EIX

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

danko

C2

185.161.248.73:4164

Attributes
  • auth_value

    784d42a6c1eb1a5060b8bcd3696f5f1e

Targets

    • Target

      faed29eb766db600961f9423a479f19c7d4d64724814e28d73b0502d520d7033

    • Size

      851KB

    • MD5

      0790baaf9bbcb07269d4dc0d035dd66f

    • SHA1

      b3ef4b950f79283490c547813f97ff23a878a1d2

    • SHA256

      faed29eb766db600961f9423a479f19c7d4d64724814e28d73b0502d520d7033

    • SHA512

      b442da8418870b6f51b62849eb41802d2e144e309fd3e7dc215adf302af3e5ac08a1bf6db916836df74ff6501cb0c090e54fe7b45777059d242ab4c0314436ee

    • SSDEEP

      12288:8y90dQ8Zi3+uGRofOv6FIVppH/QBC+NE7k7N96NBnGP+J3huywkFBh4igIfKkTeX:8yR8c3NGSmv4IV//QBS+9w6+qiX4EIX

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks