General
-
Target
38e22800a6be2449a17420b848e183b881f36f00bdc758f6a11b0b10f9e6e9b2
-
Size
1.5MB
-
Sample
230505-wx3e8sce76
-
MD5
b52a6a67f7ce03b411992b6e8f908964
-
SHA1
d58803c0be76c42a411adb5ba03990867abdf9c5
-
SHA256
38e22800a6be2449a17420b848e183b881f36f00bdc758f6a11b0b10f9e6e9b2
-
SHA512
7badb3ebae35e624a657b269586aa08f5365957297d03e2b13cb88b6521ee30ad7d86d49d9454f93d41491af5e021767051eccabae5bac988b1b8dc375e49227
-
SSDEEP
49152:9lrebYOMmBqKWSbk9DmV0TiNP+ETMpuvZ:ebYNYq649DAP+EIpuvZ
Static task
static1
Behavioral task
behavioral1
Sample
38e22800a6be2449a17420b848e183b881f36f00bdc758f6a11b0b10f9e6e9b2.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
38e22800a6be2449a17420b848e183b881f36f00bdc758f6a11b0b10f9e6e9b2.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
boom
217.196.96.56:4138
-
auth_value
1ce6aebe15bac07a7bc88b114bc49335
Targets
-
-
Target
38e22800a6be2449a17420b848e183b881f36f00bdc758f6a11b0b10f9e6e9b2
-
Size
1.5MB
-
MD5
b52a6a67f7ce03b411992b6e8f908964
-
SHA1
d58803c0be76c42a411adb5ba03990867abdf9c5
-
SHA256
38e22800a6be2449a17420b848e183b881f36f00bdc758f6a11b0b10f9e6e9b2
-
SHA512
7badb3ebae35e624a657b269586aa08f5365957297d03e2b13cb88b6521ee30ad7d86d49d9454f93d41491af5e021767051eccabae5bac988b1b8dc375e49227
-
SSDEEP
49152:9lrebYOMmBqKWSbk9DmV0TiNP+ETMpuvZ:ebYNYq649DAP+EIpuvZ
-
Detects Redline Stealer samples
This rule detects the presence of Redline Stealer samples based on their unique strings.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-