General
-
Target
S0LICITUDDEPRESUPUESTO240423.exe.bin
-
Size
211KB
-
Sample
230505-zrj89aed66
-
MD5
f4a13d7f220fd8db56fafbdb62828a50
-
SHA1
ed98f720d6481db8d45aba7a3889d9974902d437
-
SHA256
2178c25cf14793aa8845ca8ee9f76d3271c91bc5eb763e97919415f9fb7d5e1d
-
SHA512
0d6cd19ccc47a28491f5cd442a32ec83183cc093835913cf7ca94ac679609ce648c2f15d3a11722d35d2fd5cff943abe7c073639d32e49ea294e88360cd811ac
-
SSDEEP
3072:i748SBjtujuYWofGa2OTeyGuPMZmzsq9Y2YhuhWDNJQZ5hJ8RDMh/CQgutfxvXX4:i7MOuYCduEZ8sq9Y2RWfWMRI9Ocn4
Static task
static1
Behavioral task
behavioral1
Sample
S0LICITUDDEPRESUPUESTO240423.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
S0LICITUDDEPRESUPUESTO240423.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5627356603:AAG-Mx0TbSHRRW6IwndrpX3VLZdhd6C-Zac/sendMessage?chat_id=5472437377
Targets
-
-
Target
S0LICITUDDEPRESUPUESTO240423.exe.bin
-
Size
211KB
-
MD5
f4a13d7f220fd8db56fafbdb62828a50
-
SHA1
ed98f720d6481db8d45aba7a3889d9974902d437
-
SHA256
2178c25cf14793aa8845ca8ee9f76d3271c91bc5eb763e97919415f9fb7d5e1d
-
SHA512
0d6cd19ccc47a28491f5cd442a32ec83183cc093835913cf7ca94ac679609ce648c2f15d3a11722d35d2fd5cff943abe7c073639d32e49ea294e88360cd811ac
-
SSDEEP
3072:i748SBjtujuYWofGa2OTeyGuPMZmzsq9Y2YhuhWDNJQZ5hJ8RDMh/CQgutfxvXX4:i7MOuYCduEZ8sq9Y2RWfWMRI9Ocn4
-
Detects Redline Stealer samples
This rule detects the presence of Redline Stealer samples based on their unique strings.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
StormKitty payload
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-