General
-
Target
ce8d6ea2ce0476cba4ee150f0ff4671562f6d965a5937f4c5fb8990f705a82b4.bin
-
Size
1.5MB
-
Sample
230501-w4j78see8z
-
MD5
34dc1d939d6c96e504e8ff495fa6d5cb
-
SHA1
61f64822257d2280057716229e993cdc74050042
-
SHA256
ce8d6ea2ce0476cba4ee150f0ff4671562f6d965a5937f4c5fb8990f705a82b4
-
SHA512
d96c4262661bbf53c89d71c5accf06300ad7922e6a0f4b78a8ec6d087d6386473812534b963c801ae5d468360660fedcca86e3fcb82e4b99650e849a008dab60
-
SSDEEP
24576:/ygNcuhM4KISJCR7CtPvionEGFivRmA7fv00Oc3SXQTeUOBKp+9fEaGnu1:K7uh4MROtnXnEXv5jcXc3c9GIV0nu
Static task
static1
Behavioral task
behavioral1
Sample
ce8d6ea2ce0476cba4ee150f0ff4671562f6d965a5937f4c5fb8990f705a82b4.exe
Resource
win7-20230220-en
Malware Config
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
life
185.161.248.73:4164
-
auth_value
8685d11953530b68ad5ec703809d9f91
Targets
-
-
Target
ce8d6ea2ce0476cba4ee150f0ff4671562f6d965a5937f4c5fb8990f705a82b4.bin
-
Size
1.5MB
-
MD5
34dc1d939d6c96e504e8ff495fa6d5cb
-
SHA1
61f64822257d2280057716229e993cdc74050042
-
SHA256
ce8d6ea2ce0476cba4ee150f0ff4671562f6d965a5937f4c5fb8990f705a82b4
-
SHA512
d96c4262661bbf53c89d71c5accf06300ad7922e6a0f4b78a8ec6d087d6386473812534b963c801ae5d468360660fedcca86e3fcb82e4b99650e849a008dab60
-
SSDEEP
24576:/ygNcuhM4KISJCR7CtPvionEGFivRmA7fv00Oc3SXQTeUOBKp+9fEaGnu1:K7uh4MROtnXnEXv5jcXc3c9GIV0nu
-
Detects Redline Stealer samples
This rule detects the presence of Redline Stealer samples based on their unique strings.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-