General
-
Target
5d4a9d5b6b86dabdc9a755410b77318d05ef000cee6812a3ece63c7b426d02ec
-
Size
4.2MB
-
Sample
230506-113bvscg21
-
MD5
9ce9e387752e13dd149c6188a00c7cfe
-
SHA1
66e55b851ce39a6e5e86fdd25cecabaa5f917f92
-
SHA256
5d4a9d5b6b86dabdc9a755410b77318d05ef000cee6812a3ece63c7b426d02ec
-
SHA512
b6164921f1a7bc37054aadb92244ac0659f6db5e2639da1402ba5bece42056fbed7d8279708e85000f4fbd956316ff693cc094f69a15077be142b5f61c7e816a
-
SSDEEP
98304:TSCUAjZ154PZGsgtV5AdQu6Z9g1OvCQplUG5vHAbiyhzECLO4+LGO04:TSCHz5KZGHt3AuhZygvLR5vg9OzB7
Static task
static1
Behavioral task
behavioral1
Sample
5d4a9d5b6b86dabdc9a755410b77318d05ef000cee6812a3ece63c7b426d02ec.exe
Resource
win7-20230220-en
Malware Config
Targets
-
-
Target
5d4a9d5b6b86dabdc9a755410b77318d05ef000cee6812a3ece63c7b426d02ec
-
Size
4.2MB
-
MD5
9ce9e387752e13dd149c6188a00c7cfe
-
SHA1
66e55b851ce39a6e5e86fdd25cecabaa5f917f92
-
SHA256
5d4a9d5b6b86dabdc9a755410b77318d05ef000cee6812a3ece63c7b426d02ec
-
SHA512
b6164921f1a7bc37054aadb92244ac0659f6db5e2639da1402ba5bece42056fbed7d8279708e85000f4fbd956316ff693cc094f69a15077be142b5f61c7e816a
-
SSDEEP
98304:TSCUAjZ154PZGsgtV5AdQu6Z9g1OvCQplUG5vHAbiyhzECLO4+LGO04:TSCHz5KZGHt3AuhZygvLR5vg9OzB7
-
Detects Redline Stealer samples
This rule detects the presence of Redline Stealer samples based on their unique strings.
-
Detects any file with a triage score of 10
This file has been assigned a triage score of 10, indicating a high likelihood of malicious behavior.
-
Glupteba payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-