General
-
Target
S0LICITUDDEPRESUPUESTO240423.ISO.iso.bin
-
Size
1.2MB
-
Sample
230505-zrkj1sed67
-
MD5
f81832d1759a25d688c840ee5eee6fb5
-
SHA1
af587f9f3fbf23166f82573056aa972aef26ec29
-
SHA256
7b24e9a8334000a1e10dd9cdf66e92e46f890e5a89f77c6bd7e1957a2a97320b
-
SHA512
a72dd330103d2dea85799b21dac79ae1b98112e8fdce99227febeb530e1c29d33dd3d181d43cc499d9ec50a99864d81b73201157b61249a32351edde50818ba9
-
SSDEEP
3072:s748SBjtujuYWofGa2OTeyGuPMZmzsq9Y2YhuhWDNJQZ5hJ8RDMh/CQgutfxvXX4:s7MOuYCduEZ8sq9Y2RWfWMRI9Ocn4
Static task
static1
Behavioral task
behavioral1
Sample
S0LICITU.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
S0LICITU.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5627356603:AAG-Mx0TbSHRRW6IwndrpX3VLZdhd6C-Zac/sendMessage?chat_id=5472437377
Targets
-
-
Target
S0LICITU.EXE
-
Size
211KB
-
MD5
f4a13d7f220fd8db56fafbdb62828a50
-
SHA1
ed98f720d6481db8d45aba7a3889d9974902d437
-
SHA256
2178c25cf14793aa8845ca8ee9f76d3271c91bc5eb763e97919415f9fb7d5e1d
-
SHA512
0d6cd19ccc47a28491f5cd442a32ec83183cc093835913cf7ca94ac679609ce648c2f15d3a11722d35d2fd5cff943abe7c073639d32e49ea294e88360cd811ac
-
SSDEEP
3072:i748SBjtujuYWofGa2OTeyGuPMZmzsq9Y2YhuhWDNJQZ5hJ8RDMh/CQgutfxvXX4:i7MOuYCduEZ8sq9Y2RWfWMRI9Ocn4
-
Detects Redline Stealer samples
This rule detects the presence of Redline Stealer samples based on their unique strings.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
StormKitty payload
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-