General
-
Target
20ef12c3cf75d4939f98c5dcb7887046b8e709240c334f5654e7fba9e09e6d54.bin
-
Size
810KB
-
Sample
230506-zq3dfafg5v
-
MD5
684b32ec62c1fa371788a7d6f879a8e0
-
SHA1
bbc3626a8e873035fd2b5426ab27b17a2adcd260
-
SHA256
20ef12c3cf75d4939f98c5dcb7887046b8e709240c334f5654e7fba9e09e6d54
-
SHA512
e59fb114af0bbb1d0ddf776136f678d3fc84f7d824db3972b18f1598bac6a4dd69c4587f891782a97d161b0bee9ea61d87c36d32d964350992033a71ca97e4e8
-
SSDEEP
24576:zydA1VOIiLNAk0MRBRzxjZa2g81fvm9MH4pp:GdeZCNAk11FU81fvRYp
Static task
static1
Behavioral task
behavioral1
Sample
20ef12c3cf75d4939f98c5dcb7887046b8e709240c334f5654e7fba9e09e6d54.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
20ef12c3cf75d4939f98c5dcb7887046b8e709240c334f5654e7fba9e09e6d54.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dark
185.161.248.73:4164
-
auth_value
ae85b01f66afe8770afeed560513fc2d
Targets
-
-
Target
20ef12c3cf75d4939f98c5dcb7887046b8e709240c334f5654e7fba9e09e6d54.bin
-
Size
810KB
-
MD5
684b32ec62c1fa371788a7d6f879a8e0
-
SHA1
bbc3626a8e873035fd2b5426ab27b17a2adcd260
-
SHA256
20ef12c3cf75d4939f98c5dcb7887046b8e709240c334f5654e7fba9e09e6d54
-
SHA512
e59fb114af0bbb1d0ddf776136f678d3fc84f7d824db3972b18f1598bac6a4dd69c4587f891782a97d161b0bee9ea61d87c36d32d964350992033a71ca97e4e8
-
SSDEEP
24576:zydA1VOIiLNAk0MRBRzxjZa2g81fvm9MH4pp:GdeZCNAk11FU81fvRYp
-
Detects Redline Stealer samples
This rule detects the presence of Redline Stealer samples based on their unique strings.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-