General
-
Target
525f5752f3b8405a0a6a016943b37ec07dec3783c45cbf8feddea3fefeee8da3
-
Size
479KB
-
Sample
230506-1sz7jabg8z
-
MD5
1ac2cd0e573e8cf4e5f22d11aa2f0dac
-
SHA1
5e5b432c2103c1a94c6a7ca5523cb5a243d7aa93
-
SHA256
525f5752f3b8405a0a6a016943b37ec07dec3783c45cbf8feddea3fefeee8da3
-
SHA512
04ab1bba18c803cb25e541da75a3055201f8a252f1efe09ac48148ce04a98b9fb49a7ff18a9b86ceba3d85421aec3826394c1515b9087fe3da7457c34fd69d93
-
SSDEEP
12288:fMrly90/lU3TaaUxvXmD1ax7Ms7p/E2jPcQmyY:GyVPUdWD47vp/EP9yY
Static task
static1
Behavioral task
behavioral1
Sample
525f5752f3b8405a0a6a016943b37ec07dec3783c45cbf8feddea3fefeee8da3.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
525f5752f3b8405a0a6a016943b37ec07dec3783c45cbf8feddea3fefeee8da3.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
maxud
217.196.96.101:4132
-
auth_value
f1403d964c52b6641ba1ef14803e6e74
Targets
-
-
Target
525f5752f3b8405a0a6a016943b37ec07dec3783c45cbf8feddea3fefeee8da3
-
Size
479KB
-
MD5
1ac2cd0e573e8cf4e5f22d11aa2f0dac
-
SHA1
5e5b432c2103c1a94c6a7ca5523cb5a243d7aa93
-
SHA256
525f5752f3b8405a0a6a016943b37ec07dec3783c45cbf8feddea3fefeee8da3
-
SHA512
04ab1bba18c803cb25e541da75a3055201f8a252f1efe09ac48148ce04a98b9fb49a7ff18a9b86ceba3d85421aec3826394c1515b9087fe3da7457c34fd69d93
-
SSDEEP
12288:fMrly90/lU3TaaUxvXmD1ax7Ms7p/E2jPcQmyY:GyVPUdWD47vp/EP9yY
-
Detects Redline Stealer samples
This rule detects the presence of Redline Stealer samples based on their unique strings.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-