General
-
Target
01e031d7c05c245ecff24a536b5005d2.exe
-
Size
1.1MB
-
Sample
230506-yx5xgaaf67
-
MD5
01e031d7c05c245ecff24a536b5005d2
-
SHA1
329e480e96472c35044d13713475ebeb7da91891
-
SHA256
4ec76c6c6b2b93873c53cbf094d1b4ad911e9615947039d8735e3e72e9b34ca2
-
SHA512
78560b5a7f8a6c6b544c60a556990c259d27d34af78fc4617b382294d50e044125eb1b780c8360a96593e269a5d1dd40023b7e1f1c3ee37e4bc610125ade8da2
-
SSDEEP
24576:STbBv5rUg09NfbZYkgcGBslupFKUEBCjDWhGapW:0BRe1bZYKGOl+FKUoCjDW6
Static task
static1
Behavioral task
behavioral1
Sample
01e031d7c05c245ecff24a536b5005d2.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
01e031d7c05c245ecff24a536b5005d2.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
icarusstealer
-
payload_url
https://raw.githubusercontent.com/HiddenEyeZ/tg/main/rt.jpg
Targets
-
-
Target
01e031d7c05c245ecff24a536b5005d2.exe
-
Size
1.1MB
-
MD5
01e031d7c05c245ecff24a536b5005d2
-
SHA1
329e480e96472c35044d13713475ebeb7da91891
-
SHA256
4ec76c6c6b2b93873c53cbf094d1b4ad911e9615947039d8735e3e72e9b34ca2
-
SHA512
78560b5a7f8a6c6b544c60a556990c259d27d34af78fc4617b382294d50e044125eb1b780c8360a96593e269a5d1dd40023b7e1f1c3ee37e4bc610125ade8da2
-
SSDEEP
24576:STbBv5rUg09NfbZYkgcGBslupFKUEBCjDWhGapW:0BRe1bZYKGOl+FKUoCjDW6
-
Detects Redline Stealer samples
This rule detects the presence of Redline Stealer samples based on their unique strings.
-
IcarusStealer
Icarus is a modular stealer written in C# First adverts in July 2022.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-