General
-
Target
6f7816d4f43a3b3d73e2166057f56ddcdd2ed1c922a91743a0be4bc0b58592f4.bin
-
Size
1.2MB
-
Sample
230506-2dknzace63
-
MD5
e2daeda870d6802704cc5ac873dc465b
-
SHA1
73054bd775105fe569331c3339febe633d3c3646
-
SHA256
6f7816d4f43a3b3d73e2166057f56ddcdd2ed1c922a91743a0be4bc0b58592f4
-
SHA512
3845429b0b1b71f63b66a3be5f2e8e24d745e95c77046994508e1ce57ace1e4ea52b8abd2304dda1528b9269f3d27af8e082481ad8cb51b178377351cecf909c
-
SSDEEP
24576:pyNO4WkaIjjKjYGrOfWfxe0A1+prHJa1zRAaP2uk9L/6sp:cMHpNmfExxA1+NHJalRAaM/
Static task
static1
Behavioral task
behavioral1
Sample
6f7816d4f43a3b3d73e2166057f56ddcdd2ed1c922a91743a0be4bc0b58592f4.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
6f7816d4f43a3b3d73e2166057f56ddcdd2ed1c922a91743a0be4bc0b58592f4.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
life
185.161.248.73:4164
-
auth_value
8685d11953530b68ad5ec703809d9f91
Targets
-
-
Target
6f7816d4f43a3b3d73e2166057f56ddcdd2ed1c922a91743a0be4bc0b58592f4.bin
-
Size
1.2MB
-
MD5
e2daeda870d6802704cc5ac873dc465b
-
SHA1
73054bd775105fe569331c3339febe633d3c3646
-
SHA256
6f7816d4f43a3b3d73e2166057f56ddcdd2ed1c922a91743a0be4bc0b58592f4
-
SHA512
3845429b0b1b71f63b66a3be5f2e8e24d745e95c77046994508e1ce57ace1e4ea52b8abd2304dda1528b9269f3d27af8e082481ad8cb51b178377351cecf909c
-
SSDEEP
24576:pyNO4WkaIjjKjYGrOfWfxe0A1+prHJa1zRAaP2uk9L/6sp:cMHpNmfExxA1+NHJalRAaM/
Score10/10-
Detects Redline Stealer samples
This rule detects the presence of Redline Stealer samples based on their unique strings.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-