General
-
Target
5355d455dd283302f397066afbd59037e698c0947f2026eca77cf6bf0c64e37c.bin
-
Size
1.5MB
-
Sample
230506-1tv9zabh6x
-
MD5
37460284b9c64586e6a4450ac66e28a5
-
SHA1
fcffbba2b45b0db8c1e60391244f420e00f92431
-
SHA256
5355d455dd283302f397066afbd59037e698c0947f2026eca77cf6bf0c64e37c
-
SHA512
b49e79370705cf59fa20e9709b72b8627bca3abf8983d8e27fd64b7e381b96a7b1f5a764d9a65400a7b4acba226a81bc3af5c778d254f4d6e09d9bbf2cd8eae2
-
SSDEEP
24576:EyoAwSfmzyb8h98Q+u3htpQFMiCq0dt9UesYLzESWKHeZROGsFs3kHXBvEyEY:THwpz2oJRt6F9Cq0dnGkAKHeZR+O3AX8
Static task
static1
Behavioral task
behavioral1
Sample
5355d455dd283302f397066afbd59037e698c0947f2026eca77cf6bf0c64e37c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5355d455dd283302f397066afbd59037e698c0947f2026eca77cf6bf0c64e37c.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
most
185.161.248.73:4164
-
auth_value
7da4dfa153f2919e617aa016f7c36008
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Targets
-
-
Target
5355d455dd283302f397066afbd59037e698c0947f2026eca77cf6bf0c64e37c.bin
-
Size
1.5MB
-
MD5
37460284b9c64586e6a4450ac66e28a5
-
SHA1
fcffbba2b45b0db8c1e60391244f420e00f92431
-
SHA256
5355d455dd283302f397066afbd59037e698c0947f2026eca77cf6bf0c64e37c
-
SHA512
b49e79370705cf59fa20e9709b72b8627bca3abf8983d8e27fd64b7e381b96a7b1f5a764d9a65400a7b4acba226a81bc3af5c778d254f4d6e09d9bbf2cd8eae2
-
SSDEEP
24576:EyoAwSfmzyb8h98Q+u3htpQFMiCq0dt9UesYLzESWKHeZROGsFs3kHXBvEyEY:THwpz2oJRt6F9Cq0dnGkAKHeZR+O3AX8
-
Detects Redline Stealer samples
This rule detects the presence of Redline Stealer samples based on their unique strings.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-