General
-
Target
891be784d05c66d2591cc9fa706920212880973c35c5692b8f404674210d00d9
-
Size
600KB
-
Sample
230505-w8q7caga3x
-
MD5
3095e8552fc8a6b3e97fd5f239ccedb0
-
SHA1
39235e529b6627606e8261b334bfcb561fc748e1
-
SHA256
891be784d05c66d2591cc9fa706920212880973c35c5692b8f404674210d00d9
-
SHA512
b8ec2fdbc6dd9fedd93e6a5456140c0e29f5334ddec9cccb62c15dadaaf57bda91ccb34e467e266ae104379019a53d37de9233fd705467253af700db1e1f34bb
-
SSDEEP
12288:EMr8y90UiqEyQwUwN3WHE9Ajw2VJ9y8VgEk11dkyZNlsFSRf1WfbYPu:oyHZEvrrHEwRVJw8VgpnbNzfAfbYPu
Static task
static1
Behavioral task
behavioral1
Sample
891be784d05c66d2591cc9fa706920212880973c35c5692b8f404674210d00d9.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
891be784d05c66d2591cc9fa706920212880973c35c5692b8f404674210d00d9.exe
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
891be784d05c66d2591cc9fa706920212880973c35c5692b8f404674210d00d9
-
Size
600KB
-
MD5
3095e8552fc8a6b3e97fd5f239ccedb0
-
SHA1
39235e529b6627606e8261b334bfcb561fc748e1
-
SHA256
891be784d05c66d2591cc9fa706920212880973c35c5692b8f404674210d00d9
-
SHA512
b8ec2fdbc6dd9fedd93e6a5456140c0e29f5334ddec9cccb62c15dadaaf57bda91ccb34e467e266ae104379019a53d37de9233fd705467253af700db1e1f34bb
-
SSDEEP
12288:EMr8y90UiqEyQwUwN3WHE9Ajw2VJ9y8VgEk11dkyZNlsFSRf1WfbYPu:oyHZEvrrHEwRVJw8VgpnbNzfAfbYPu
-
Detects Redline Stealer samples
This rule detects the presence of Redline Stealer samples based on their unique strings.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-