General
-
Target
a52011a4b10910fe9d861a1b07659086bb96e1c2131aef26c007f9d038fbc4e7
-
Size
1.4MB
-
Sample
230505-xgdbvaeh67
-
MD5
4a1a2d8cea273b2f00fdb392b11d28bb
-
SHA1
18c1ccae707fc0b4e3a924d2ce15208cc491caf1
-
SHA256
a52011a4b10910fe9d861a1b07659086bb96e1c2131aef26c007f9d038fbc4e7
-
SHA512
c5fcb678a752607c0363b37712dc646df4f2f55292f819d78512db88217fffda1b870c37ba026422e4914e208f2d229aaeccb3e63467520c5c1efb29b4aa3e48
-
SSDEEP
24576:ryzkBD8B9son0UFv0QJOGc+adN9mTuncYqeSZENEcOjnzAn7gfTHkmiC/Np4Yw9Z:eWIBr0Up0QZc+e7lnMemEecO7zA7oHk5
Static task
static1
Behavioral task
behavioral1
Sample
a52011a4b10910fe9d861a1b07659086bb96e1c2131aef26c007f9d038fbc4e7.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a52011a4b10910fe9d861a1b07659086bb96e1c2131aef26c007f9d038fbc4e7.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
mask
217.196.96.56:4138
-
auth_value
31aef25be0febb8e491794ef7f502c50
Extracted
redline
boom
217.196.96.56:4138
-
auth_value
1ce6aebe15bac07a7bc88b114bc49335
Targets
-
-
Target
a52011a4b10910fe9d861a1b07659086bb96e1c2131aef26c007f9d038fbc4e7
-
Size
1.4MB
-
MD5
4a1a2d8cea273b2f00fdb392b11d28bb
-
SHA1
18c1ccae707fc0b4e3a924d2ce15208cc491caf1
-
SHA256
a52011a4b10910fe9d861a1b07659086bb96e1c2131aef26c007f9d038fbc4e7
-
SHA512
c5fcb678a752607c0363b37712dc646df4f2f55292f819d78512db88217fffda1b870c37ba026422e4914e208f2d229aaeccb3e63467520c5c1efb29b4aa3e48
-
SSDEEP
24576:ryzkBD8B9son0UFv0QJOGc+adN9mTuncYqeSZENEcOjnzAn7gfTHkmiC/Np4Yw9Z:eWIBr0Up0QZc+e7lnMemEecO7zA7oHk5
-
Detects Redline Stealer samples
This rule detects the presence of Redline Stealer samples based on their unique strings.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-