General
-
Target
cebbfd95d0b5662b4b748607f7c6343b1d8d816bcdb14446945cb89477f0151b
-
Size
589KB
-
Sample
230505-yehzzscc3v
-
MD5
76a5e0b34f24d21e1137091e26826383
-
SHA1
f385617206c6cbca3e167fbf4ecd53745b248a2f
-
SHA256
cebbfd95d0b5662b4b748607f7c6343b1d8d816bcdb14446945cb89477f0151b
-
SHA512
6a84ab893e8830b52272722086fa11d47cf29c5f01b4858e7e368f2ce63e4d6e9067a7159cdf8796cf4157f19f6547a4ad77e7c5904b014cc8f2981cc205a7cc
-
SSDEEP
12288:EMryYy90d7rfuIF3bqrGg1hSNhQv7/kgxQiBdG7QF:HyouIF3bEJSNh8Dkgx3GkF
Static task
static1
Behavioral task
behavioral1
Sample
cebbfd95d0b5662b4b748607f7c6343b1d8d816bcdb14446945cb89477f0151b.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
cebbfd95d0b5662b4b748607f7c6343b1d8d816bcdb14446945cb89477f0151b.exe
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
cebbfd95d0b5662b4b748607f7c6343b1d8d816bcdb14446945cb89477f0151b
-
Size
589KB
-
MD5
76a5e0b34f24d21e1137091e26826383
-
SHA1
f385617206c6cbca3e167fbf4ecd53745b248a2f
-
SHA256
cebbfd95d0b5662b4b748607f7c6343b1d8d816bcdb14446945cb89477f0151b
-
SHA512
6a84ab893e8830b52272722086fa11d47cf29c5f01b4858e7e368f2ce63e4d6e9067a7159cdf8796cf4157f19f6547a4ad77e7c5904b014cc8f2981cc205a7cc
-
SSDEEP
12288:EMryYy90d7rfuIF3bqrGg1hSNhQv7/kgxQiBdG7QF:HyouIF3bEJSNh8Dkgx3GkF
-
Detects Redline Stealer samples
This rule detects the presence of Redline Stealer samples based on their unique strings.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-