General
-
Target
db968d8482a1dda1724930129b256249cf0baf18ac6f485ec85297936ff17fdd.bin
-
Size
1.5MB
-
Sample
230505-yqbp2sdc7w
-
MD5
a27807c47500a2ebe1ee4fad424cabfa
-
SHA1
3fa277338d2dca31abd07e7dc387b742b70bd6a1
-
SHA256
db968d8482a1dda1724930129b256249cf0baf18ac6f485ec85297936ff17fdd
-
SHA512
1a5fb401d60845898e0bf4f7900399d5bc2967d1b5d7dbecf4cb7ecb3ed480305072914996a290a5548e4987a3b11b9d62c437b332fc19061938eb0900a36530
-
SSDEEP
24576:3ya2oXysivjqT0cXb0tktJKH9epNaQKNXy43es9Ach7zbKweoN3CZas3k1if/WFb:Cb/socr02tsH9epNBK359NbKweoNA93r
Static task
static1
Behavioral task
behavioral1
Sample
db968d8482a1dda1724930129b256249cf0baf18ac6f485ec85297936ff17fdd.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
db968d8482a1dda1724930129b256249cf0baf18ac6f485ec85297936ff17fdd.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
life
185.161.248.73:4164
-
auth_value
8685d11953530b68ad5ec703809d9f91
Targets
-
-
Target
db968d8482a1dda1724930129b256249cf0baf18ac6f485ec85297936ff17fdd.bin
-
Size
1.5MB
-
MD5
a27807c47500a2ebe1ee4fad424cabfa
-
SHA1
3fa277338d2dca31abd07e7dc387b742b70bd6a1
-
SHA256
db968d8482a1dda1724930129b256249cf0baf18ac6f485ec85297936ff17fdd
-
SHA512
1a5fb401d60845898e0bf4f7900399d5bc2967d1b5d7dbecf4cb7ecb3ed480305072914996a290a5548e4987a3b11b9d62c437b332fc19061938eb0900a36530
-
SSDEEP
24576:3ya2oXysivjqT0cXb0tktJKH9epNaQKNXy43es9Ach7zbKweoN3CZas3k1if/WFb:Cb/socr02tsH9epNBK359NbKweoNA93r
-
Detects Redline Stealer samples
This rule detects the presence of Redline Stealer samples based on their unique strings.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-