General
-
Target
45599ce0933ab70eec723fca04e976be74cdcf514483c5c0aa481f3476331410
-
Size
709KB
-
Sample
230505-wzgljscg52
-
MD5
2ef5d29dd22a19098f407e85b0bdfb9f
-
SHA1
4870dea4e7672053760445a8cd3199cfc40e46a2
-
SHA256
45599ce0933ab70eec723fca04e976be74cdcf514483c5c0aa481f3476331410
-
SHA512
7c6d1692268d02fb1f7e82410cd449724a28a0856f6d1da4c5a0cda65521ac024e58f392eb3d8bff6300a9dc237c5229f93bda56ab7cc834915c6d58baafc357
-
SSDEEP
12288:CMrly90O43LcbFB1ztP+FMeao4CMP0idL9tDWxmLhkchsdQ/QxqAB2udR:vyl4bcbj7MMqJy/WMGcidQ/GqY
Static task
static1
Behavioral task
behavioral1
Sample
45599ce0933ab70eec723fca04e976be74cdcf514483c5c0aa481f3476331410.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
45599ce0933ab70eec723fca04e976be74cdcf514483c5c0aa481f3476331410.exe
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
45599ce0933ab70eec723fca04e976be74cdcf514483c5c0aa481f3476331410
-
Size
709KB
-
MD5
2ef5d29dd22a19098f407e85b0bdfb9f
-
SHA1
4870dea4e7672053760445a8cd3199cfc40e46a2
-
SHA256
45599ce0933ab70eec723fca04e976be74cdcf514483c5c0aa481f3476331410
-
SHA512
7c6d1692268d02fb1f7e82410cd449724a28a0856f6d1da4c5a0cda65521ac024e58f392eb3d8bff6300a9dc237c5229f93bda56ab7cc834915c6d58baafc357
-
SSDEEP
12288:CMrly90O43LcbFB1ztP+FMeao4CMP0idL9tDWxmLhkchsdQ/QxqAB2udR:vyl4bcbj7MMqJy/WMGcidQ/GqY
-
Detects Redline Stealer samples
This rule detects the presence of Redline Stealer samples based on their unique strings.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-