General

  • Target

    ff712edd1f0e1f0d8a592be1707f275fbc10522f7d6e61eaa612e96ded0fbbf2

  • Size

    773KB

  • Sample

    230507-kyq8taeg6z

  • MD5

    4804a2b6aefae575c048ae3c27119d4e

  • SHA1

    f148465558f5ca216396b4309d0b6e1526b7dab5

  • SHA256

    ff712edd1f0e1f0d8a592be1707f275fbc10522f7d6e61eaa612e96ded0fbbf2

  • SHA512

    9aab853085cc10a4177696e477c06c279dabc1f3af1283ab076d51b59c01b415522775d4954e42cb7115c86cb6e7fd6da8741c15f228dd04179efd4888c0fb06

  • SSDEEP

    12288:By90PbQCAC402oxz5iNss/N+P6U39WP25hDbJeZmnKRHlYlT4fNzdEOzida+d:ByM9vgNsSN+P99W8l2HGlT3Iida+d

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

donka

C2

185.161.248.73:4164

Attributes
  • auth_value

    ebd13e189a2e7c34425e5f4c46bb7a55

Targets

    • Target

      ff712edd1f0e1f0d8a592be1707f275fbc10522f7d6e61eaa612e96ded0fbbf2

    • Size

      773KB

    • MD5

      4804a2b6aefae575c048ae3c27119d4e

    • SHA1

      f148465558f5ca216396b4309d0b6e1526b7dab5

    • SHA256

      ff712edd1f0e1f0d8a592be1707f275fbc10522f7d6e61eaa612e96ded0fbbf2

    • SHA512

      9aab853085cc10a4177696e477c06c279dabc1f3af1283ab076d51b59c01b415522775d4954e42cb7115c86cb6e7fd6da8741c15f228dd04179efd4888c0fb06

    • SSDEEP

      12288:By90PbQCAC402oxz5iNss/N+P6U39WP25hDbJeZmnKRHlYlT4fNzdEOzida+d:ByM9vgNsSN+P99W8l2HGlT3Iida+d

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks