General
-
Target
3142c7c9413146c6761b17dd800f4eeea8cfc5da1c0a8ccc2da1f868c04f444c
-
Size
567KB
-
Sample
230505-wwwajaed9t
-
MD5
45ecd72215fb07baac13dc8970235a2d
-
SHA1
7986a3585f02eae211c2ff5f9bcdd05330ab15bc
-
SHA256
3142c7c9413146c6761b17dd800f4eeea8cfc5da1c0a8ccc2da1f868c04f444c
-
SHA512
9a400137bd657b5efcea6754b380c9b0d2f3e8931ff955a7d8dbb832288ff854dd68cc2f11d4c4c26f807422c7c068e9887fd3174f9fc6df4734f4310e27beea
-
SSDEEP
12288:JMrMy90b57Gy7QIqfAjboshKTl36LXsxYBE0rkbYhyU8:NyKwyKfuhKTl36bOuE0Q0hyj
Static task
static1
Behavioral task
behavioral1
Sample
3142c7c9413146c6761b17dd800f4eeea8cfc5da1c0a8ccc2da1f868c04f444c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3142c7c9413146c6761b17dd800f4eeea8cfc5da1c0a8ccc2da1f868c04f444c.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
darm
217.196.96.56:4138
-
auth_value
d88ac8ccc04ab9979b04b46313db1648
Targets
-
-
Target
3142c7c9413146c6761b17dd800f4eeea8cfc5da1c0a8ccc2da1f868c04f444c
-
Size
567KB
-
MD5
45ecd72215fb07baac13dc8970235a2d
-
SHA1
7986a3585f02eae211c2ff5f9bcdd05330ab15bc
-
SHA256
3142c7c9413146c6761b17dd800f4eeea8cfc5da1c0a8ccc2da1f868c04f444c
-
SHA512
9a400137bd657b5efcea6754b380c9b0d2f3e8931ff955a7d8dbb832288ff854dd68cc2f11d4c4c26f807422c7c068e9887fd3174f9fc6df4734f4310e27beea
-
SSDEEP
12288:JMrMy90b57Gy7QIqfAjboshKTl36LXsxYBE0rkbYhyU8:NyKwyKfuhKTl36bOuE0Q0hyj
-
Detects Redline Stealer samples
This rule detects the presence of Redline Stealer samples based on their unique strings.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-