General
-
Target
3d197efbfa9e966f005bd8ef3d557c9099de497da481cc657da372ccd877e1ce
-
Size
1.5MB
-
Sample
230505-wyka2sef61
-
MD5
bbb4f34536020af20a72032dc7dcdb78
-
SHA1
d0926cc615dc2dde10b01d356bed1c3a9fb71256
-
SHA256
3d197efbfa9e966f005bd8ef3d557c9099de497da481cc657da372ccd877e1ce
-
SHA512
1aac40a297e6a060d693d69a843552267997050b73b145396cb170d7ba75df198b213283e20d4816c21352c25d566fd02d8cd0d521cd29d450fed4fab4179caa
-
SSDEEP
24576:9y8Mbb43UiTDNPjvvzvW+gXmV0lKLXlsOsR35Ucs2oWYHM9/Xq9rkcUK:YL4PTDxaOClKpsOR06M9/XB
Static task
static1
Behavioral task
behavioral1
Sample
3d197efbfa9e966f005bd8ef3d557c9099de497da481cc657da372ccd877e1ce.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3d197efbfa9e966f005bd8ef3d557c9099de497da481cc657da372ccd877e1ce.exe
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
3d197efbfa9e966f005bd8ef3d557c9099de497da481cc657da372ccd877e1ce
-
Size
1.5MB
-
MD5
bbb4f34536020af20a72032dc7dcdb78
-
SHA1
d0926cc615dc2dde10b01d356bed1c3a9fb71256
-
SHA256
3d197efbfa9e966f005bd8ef3d557c9099de497da481cc657da372ccd877e1ce
-
SHA512
1aac40a297e6a060d693d69a843552267997050b73b145396cb170d7ba75df198b213283e20d4816c21352c25d566fd02d8cd0d521cd29d450fed4fab4179caa
-
SSDEEP
24576:9y8Mbb43UiTDNPjvvzvW+gXmV0lKLXlsOsR35Ucs2oWYHM9/Xq9rkcUK:YL4PTDxaOClKpsOR06M9/XB
-
Detects Redline Stealer samples
This rule detects the presence of Redline Stealer samples based on their unique strings.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-