General
-
Target
0310ae2b2a6b2f6d550ed805d006f0fd2e94c5ba0a1d0155b81cbb5388379d02.bin
-
Size
932KB
-
Sample
230506-2jxkqadb82
-
MD5
c76c607c71f45df6ef1798bfdbdc4cb7
-
SHA1
e48a4fc96addb08df9b98666d4f096711cc28437
-
SHA256
0310ae2b2a6b2f6d550ed805d006f0fd2e94c5ba0a1d0155b81cbb5388379d02
-
SHA512
ec4efced8a201b80b55f5162cb9222286c363910da5c3cde73f8702940e7f9228b78a3d8f752d433d7fe6081d374fe9cd974c426f66f54df701cb83516c76cbd
-
SSDEEP
12288:dy90suBe4jCEH/+L5kJb4nWw65eUiEAU9BF6HUl/zCYfUn4on/+R6JsRqIBMK4JU:dyhSK2/+LqIEDrLCcU4o66JsUsUrw5
Static task
static1
Behavioral task
behavioral1
Sample
0310ae2b2a6b2f6d550ed805d006f0fd2e94c5ba0a1d0155b81cbb5388379d02.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0310ae2b2a6b2f6d550ed805d006f0fd2e94c5ba0a1d0155b81cbb5388379d02.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dark
185.161.248.73:4164
-
auth_value
ae85b01f66afe8770afeed560513fc2d
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Targets
-
-
Target
0310ae2b2a6b2f6d550ed805d006f0fd2e94c5ba0a1d0155b81cbb5388379d02.bin
-
Size
932KB
-
MD5
c76c607c71f45df6ef1798bfdbdc4cb7
-
SHA1
e48a4fc96addb08df9b98666d4f096711cc28437
-
SHA256
0310ae2b2a6b2f6d550ed805d006f0fd2e94c5ba0a1d0155b81cbb5388379d02
-
SHA512
ec4efced8a201b80b55f5162cb9222286c363910da5c3cde73f8702940e7f9228b78a3d8f752d433d7fe6081d374fe9cd974c426f66f54df701cb83516c76cbd
-
SSDEEP
12288:dy90suBe4jCEH/+L5kJb4nWw65eUiEAU9BF6HUl/zCYfUn4on/+R6JsRqIBMK4JU:dyhSK2/+LqIEDrLCcU4o66JsUsUrw5
-
Detects Redline Stealer samples
This rule detects the presence of Redline Stealer samples based on their unique strings.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-