General
-
Target
ORDER102718.exe
-
Size
894KB
-
Sample
230505-zpjjyage5x
-
MD5
3fb2019f03cd1972350406aa10e89961
-
SHA1
c68d0d75e6b80c9bfc5208d2f0abe6cfdfa5257f
-
SHA256
4a1a8fa3ff7b0bf9c376592e6335c82e99536853c0d274bce1a8443335a2cdde
-
SHA512
869b9e81ad75e237515cee44d7aa73af32e0119c498a309c3ef541f6bc694384e82694bc6234776dfa564c1f1159c9ba2044f554e0edb9cf0ce83a2eeb9d996e
-
SSDEEP
12288:Cw0d2qj8Jz2q6InYwN4ZCM5WdK/ypQU46cyL+l:ZAdj8JKg6C+Wd4qp46cyI
Static task
static1
Behavioral task
behavioral1
Sample
ORDER102718.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ORDER102718.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5587666659:AAG8NrrXJQs__dhk8nLJBFOspz2my8OVpX0/sendMessage?chat_id=5569775004
Targets
-
-
Target
ORDER102718.exe
-
Size
894KB
-
MD5
3fb2019f03cd1972350406aa10e89961
-
SHA1
c68d0d75e6b80c9bfc5208d2f0abe6cfdfa5257f
-
SHA256
4a1a8fa3ff7b0bf9c376592e6335c82e99536853c0d274bce1a8443335a2cdde
-
SHA512
869b9e81ad75e237515cee44d7aa73af32e0119c498a309c3ef541f6bc694384e82694bc6234776dfa564c1f1159c9ba2044f554e0edb9cf0ce83a2eeb9d996e
-
SSDEEP
12288:Cw0d2qj8Jz2q6InYwN4ZCM5WdK/ypQU46cyL+l:ZAdj8JKg6C+Wd4qp46cyI
-
Detects Redline Stealer samples
This rule detects the presence of Redline Stealer samples based on their unique strings.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-