General
-
Target
ca746188c1368388ef76747a4271de9ca319db1a6b288509ae21c656f5654c93.bin
-
Size
1.5MB
-
Sample
230505-yaz3psbh7s
-
MD5
a454ab8bd67302235473de5eb0764052
-
SHA1
d60236d42f45263d3b2f0ab2bf659a1aeba9a4c7
-
SHA256
ca746188c1368388ef76747a4271de9ca319db1a6b288509ae21c656f5654c93
-
SHA512
c58fc33599b95a3cd1043a69391d112457d11f06bf238c840517c21dd1e4f7cddbea7c2b1bdfca4e1f8a24275dfd0161b8b45bd4ea72e6de3723fbb4e4b750b4
-
SSDEEP
24576:NyWC/qKjmI1b/ptBUmORwwQwthUatpTfgjWjEjyELJ4RyrqFmIj99WARy+:onqKjmItRt2Pgsntpyfrg/OU
Static task
static1
Behavioral task
behavioral1
Sample
ca746188c1368388ef76747a4271de9ca319db1a6b288509ae21c656f5654c93.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ca746188c1368388ef76747a4271de9ca319db1a6b288509ae21c656f5654c93.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
life
185.161.248.73:4164
-
auth_value
8685d11953530b68ad5ec703809d9f91
Targets
-
-
Target
ca746188c1368388ef76747a4271de9ca319db1a6b288509ae21c656f5654c93.bin
-
Size
1.5MB
-
MD5
a454ab8bd67302235473de5eb0764052
-
SHA1
d60236d42f45263d3b2f0ab2bf659a1aeba9a4c7
-
SHA256
ca746188c1368388ef76747a4271de9ca319db1a6b288509ae21c656f5654c93
-
SHA512
c58fc33599b95a3cd1043a69391d112457d11f06bf238c840517c21dd1e4f7cddbea7c2b1bdfca4e1f8a24275dfd0161b8b45bd4ea72e6de3723fbb4e4b750b4
-
SSDEEP
24576:NyWC/qKjmI1b/ptBUmORwwQwthUatpTfgjWjEjyELJ4RyrqFmIj99WARy+:onqKjmItRt2Pgsntpyfrg/OU
-
Detects Redline Stealer samples
This rule detects the presence of Redline Stealer samples based on their unique strings.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-