General
-
Target
d4d447b5d1b4d56eca66896b1a9408f2.exe.bin
-
Size
933KB
-
Sample
230501-w9v7padc92
-
MD5
d4d447b5d1b4d56eca66896b1a9408f2
-
SHA1
5f5bc05a6c65b215432280f03b82cb7c0c8a9b77
-
SHA256
57463691087b3aad8865ab2c66499940cd8254b18c8429ddf09ef61cf4b1068d
-
SHA512
e74896b9d6fc1fee89ecdb3bf10a0fe7791f237a5f2b74546738c4e45c642ea02a592793eb87f08d15f9ba281352d6b3c1cd32e82617d3c195254ec8b98e33b6
-
SSDEEP
12288:2y90ym+ASPxVlO6ieo7Q8nAIH4uWwkMdlkEtnySJHUl/zzRxUP4o1/JRklRe/YOH:2y8+N5DjoHcMXkEtoLzLUAoFklpOa/w
Static task
static1
Behavioral task
behavioral1
Sample
d4d447b5d1b4d56eca66896b1a9408f2.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d4d447b5d1b4d56eca66896b1a9408f2.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dark
185.161.248.73:4164
-
auth_value
ae85b01f66afe8770afeed560513fc2d
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Targets
-
-
Target
d4d447b5d1b4d56eca66896b1a9408f2.exe.bin
-
Size
933KB
-
MD5
d4d447b5d1b4d56eca66896b1a9408f2
-
SHA1
5f5bc05a6c65b215432280f03b82cb7c0c8a9b77
-
SHA256
57463691087b3aad8865ab2c66499940cd8254b18c8429ddf09ef61cf4b1068d
-
SHA512
e74896b9d6fc1fee89ecdb3bf10a0fe7791f237a5f2b74546738c4e45c642ea02a592793eb87f08d15f9ba281352d6b3c1cd32e82617d3c195254ec8b98e33b6
-
SSDEEP
12288:2y90ym+ASPxVlO6ieo7Q8nAIH4uWwkMdlkEtnySJHUl/zzRxUP4o1/JRklRe/YOH:2y8+N5DjoHcMXkEtoLzLUAoFklpOa/w
-
Detects Redline Stealer samples
This rule detects the presence of Redline Stealer samples based on their unique strings.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-