General
-
Target
c8f09bc8de0896611629f879f2e823bc0ffd1b49f6daeba2521fcf5cd735eebc
-
Size
565KB
-
Sample
230505-x9y41sbg6z
-
MD5
b780628241f7884fa7692d2de458492c
-
SHA1
42d423f7b391e47837f988a539fe03e08a42991e
-
SHA256
c8f09bc8de0896611629f879f2e823bc0ffd1b49f6daeba2521fcf5cd735eebc
-
SHA512
792e1e3cfc9901b5c5874c5130f8a2ccdfc42f3760e00e1066e2694f0c58df55c12d7a709fa00e30f7800c7f055b4cc944359e53faa2e61f4b9e568d47031f0a
-
SSDEEP
12288:LMrEy90MQ5VquKZVedgAu57esaTCL3uT294PykeEIL8NU:7yDQnKbedg2bWL+T2Yy9L8q
Static task
static1
Behavioral task
behavioral1
Sample
c8f09bc8de0896611629f879f2e823bc0ffd1b49f6daeba2521fcf5cd735eebc.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
c8f09bc8de0896611629f879f2e823bc0ffd1b49f6daeba2521fcf5cd735eebc.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
darm
217.196.96.56:4138
-
auth_value
d88ac8ccc04ab9979b04b46313db1648
Targets
-
-
Target
c8f09bc8de0896611629f879f2e823bc0ffd1b49f6daeba2521fcf5cd735eebc
-
Size
565KB
-
MD5
b780628241f7884fa7692d2de458492c
-
SHA1
42d423f7b391e47837f988a539fe03e08a42991e
-
SHA256
c8f09bc8de0896611629f879f2e823bc0ffd1b49f6daeba2521fcf5cd735eebc
-
SHA512
792e1e3cfc9901b5c5874c5130f8a2ccdfc42f3760e00e1066e2694f0c58df55c12d7a709fa00e30f7800c7f055b4cc944359e53faa2e61f4b9e568d47031f0a
-
SSDEEP
12288:LMrEy90MQ5VquKZVedgAu57esaTCL3uT294PykeEIL8NU:7yDQnKbedg2bWL+T2Yy9L8q
-
Detects Redline Stealer samples
This rule detects the presence of Redline Stealer samples based on their unique strings.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-