General

  • Target

    fe4aca8f101daf86b87a43bf97a52ef5b3f1184cafb443dcd296e9427efbf471

  • Size

    891KB

  • Sample

    230507-kwkcgsee8z

  • MD5

    8c82fc9e726a384fedc1faa7b54f7381

  • SHA1

    ca566a6ad923beabf9fe37d1ef181083b072af60

  • SHA256

    fe4aca8f101daf86b87a43bf97a52ef5b3f1184cafb443dcd296e9427efbf471

  • SHA512

    793050a294d220a62bb369f9134380cc68992d5c04a658e486d3e517d8030b7ee5f8f57a7d14dbe7e54ba30661ae784549f259ad6e53a306007badeb820f1a55

  • SSDEEP

    12288:iy9045jPsqpduO54k8J93FJSUmYidG3NlnyaghJCRGdQr6n322Vrm6oqoj2ev7u:iyNjhduO5IDaMMCRGe6n322VrmZqoZu

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

danko

C2

185.161.248.73:4164

Attributes
  • auth_value

    784d42a6c1eb1a5060b8bcd3696f5f1e

Targets

    • Target

      fe4aca8f101daf86b87a43bf97a52ef5b3f1184cafb443dcd296e9427efbf471

    • Size

      891KB

    • MD5

      8c82fc9e726a384fedc1faa7b54f7381

    • SHA1

      ca566a6ad923beabf9fe37d1ef181083b072af60

    • SHA256

      fe4aca8f101daf86b87a43bf97a52ef5b3f1184cafb443dcd296e9427efbf471

    • SHA512

      793050a294d220a62bb369f9134380cc68992d5c04a658e486d3e517d8030b7ee5f8f57a7d14dbe7e54ba30661ae784549f259ad6e53a306007badeb820f1a55

    • SSDEEP

      12288:iy9045jPsqpduO54k8J93FJSUmYidG3NlnyaghJCRGdQr6n322Vrm6oqoj2ev7u:iyNjhduO5IDaMMCRGe6n322VrmZqoZu

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks