General
-
Target
0c8bb8e348eec39b5c9ee1eed5124708e6ac3c5a6a50f8167e6ca774cc6cd790.bin
-
Size
1.4MB
-
Sample
230506-y76xhsbf32
-
MD5
1426bc8713b266da50f4e8087724b6ef
-
SHA1
fbd881983e4adf5b980f2b1da37906d6de810f8f
-
SHA256
0c8bb8e348eec39b5c9ee1eed5124708e6ac3c5a6a50f8167e6ca774cc6cd790
-
SHA512
1cea06e97efd9643443b75a07247af9be52707057c553bfa2c574aa46e92f664b55c4250877f9e985e1476245f7397227e5d1883cde09a7cd0f4f1facb8b897d
-
SSDEEP
24576:wyoQBlSECSvq/KktHZS2cfRt8QWTaC719h76aspnAq8as8Pg/qqryC2p:3ml/Dt5S2OuQW2C71H7SdcN8P8
Static task
static1
Behavioral task
behavioral1
Sample
0c8bb8e348eec39b5c9ee1eed5124708e6ac3c5a6a50f8167e6ca774cc6cd790.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0c8bb8e348eec39b5c9ee1eed5124708e6ac3c5a6a50f8167e6ca774cc6cd790.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
life
185.161.248.73:4164
-
auth_value
8685d11953530b68ad5ec703809d9f91
Targets
-
-
Target
0c8bb8e348eec39b5c9ee1eed5124708e6ac3c5a6a50f8167e6ca774cc6cd790.bin
-
Size
1.4MB
-
MD5
1426bc8713b266da50f4e8087724b6ef
-
SHA1
fbd881983e4adf5b980f2b1da37906d6de810f8f
-
SHA256
0c8bb8e348eec39b5c9ee1eed5124708e6ac3c5a6a50f8167e6ca774cc6cd790
-
SHA512
1cea06e97efd9643443b75a07247af9be52707057c553bfa2c574aa46e92f664b55c4250877f9e985e1476245f7397227e5d1883cde09a7cd0f4f1facb8b897d
-
SSDEEP
24576:wyoQBlSECSvq/KktHZS2cfRt8QWTaC719h76aspnAq8as8Pg/qqryC2p:3ml/Dt5S2OuQW2C71H7SdcN8P8
-
Detects Redline Stealer samples
This rule detects the presence of Redline Stealer samples based on their unique strings.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-