General
-
Target
PO52024.PDF.ISO.bin
-
Size
1.2MB
-
Sample
230501-ywh2bagc96
-
MD5
debf413ae7f7efac1f7d6c10aab16a82
-
SHA1
2981389ba2f47c20d4a5f6b9b8b1b8768e7f36fd
-
SHA256
4d63096c6cb556e2adbd6f5f398c5a53215a9e2b613316e7dc18d928c2333dfb
-
SHA512
4d4fd97ac3b8e0057c30ad69461774784080ff78a1a40885ed7c8bd3864624682dfb5e47bfeacb3c3d176e62860c4a19144b9956436f965705f00b22c591936b
-
SSDEEP
12288:c89eoUXN+8YnrVNwsfrT0hfp2X74sCzD8e4hTyOW:5UXN+8YrVNT02QzD+hTy
Static task
static1
Behavioral task
behavioral1
Sample
PO52024.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
PO52024.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5725545513:AAF0ULWHvMJTLlnqMYoWe0CkOpQ7zVO0wLI/sendMessage?chat_id=5738281136
Targets
-
-
Target
PO52024.EXE
-
Size
606KB
-
MD5
42cf1acd0c33a70b1b4f55cf4c106a66
-
SHA1
e3156b1d0f7c0c4ae7b5f24453a97b4c2f8cc3ad
-
SHA256
9ad67bc90d52236a2893bad025077cb1f59ef0b059a0c1c4c95a803a3a3875ad
-
SHA512
bb89dd0ebb2923fa559cb0b1490282c888ec4fcdb1a12ce2a7c5f74ceec44f964f9f5f0a38e151d68326cf3542e0a7a59d8dc54bea99a1ca4df65b3003fc69cc
-
SSDEEP
12288:a89eoUXN+8YnrVNwsfrT0hfp2X74sCzD8e4hTyOW:DUXN+8YrVNT02QzD+hTy
-
Detects Redline Stealer samples
This rule detects the presence of Redline Stealer samples based on their unique strings.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-