General
-
Target
71c8f4b6fe02eae1ae062af24d751674.bin
-
Size
398KB
-
Sample
230505-w52tnsde42
-
MD5
be104a4651836a6a2771a52ff38cb0f8
-
SHA1
655e77a571f665947d4207eb32031d60dd3da854
-
SHA256
2e458fac49a9dbff3aaed5490489b577773b6b76792597b584df3ff9b2dff143
-
SHA512
01bf79d838736093a7e2194293976a2834328b235543dfaed08f5ffb814647f347f42973ca0e128b2e771acd2c0a7f683d875bc49f4adcd53361c370903192af
-
SSDEEP
12288:+QOh/ZvjbNCsZm2tyiwtpZhek26z6ocNh6:+QOh/VjBCsZm2tHwtjhi6zCNh6
Static task
static1
Behavioral task
behavioral1
Sample
7b4164cc352f02f53d9f49d8a5d6df6221b85c5412fcb133462c5d779730dc64.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
7b4164cc352f02f53d9f49d8a5d6df6221b85c5412fcb133462c5d779730dc64.exe
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
7b4164cc352f02f53d9f49d8a5d6df6221b85c5412fcb133462c5d779730dc64.exe
-
Size
566KB
-
MD5
71c8f4b6fe02eae1ae062af24d751674
-
SHA1
f442aa3847109e33868e671d833314693f4202c1
-
SHA256
7b4164cc352f02f53d9f49d8a5d6df6221b85c5412fcb133462c5d779730dc64
-
SHA512
f9449e39035cac512dd5657d752ea7660f6148955af110e6a897a66a258e30b2ded77eb24221be202245804a8807c2c42f024822a559c1982c91f536f9705d86
-
SSDEEP
12288:8YZ9daFLvg+AHMX89IX1p7X4Z36IeMLEJOXWV:8YZ9daFLvBAH7qX1FIZ3Leo6OM
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detects Redline Stealer samples
This rule detects the presence of Redline Stealer samples based on their unique strings.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-