General
-
Target
5e972195a211083a7c091b8c1be68a4bd1e47ed5204a92b6670bb8625af9d2c4.bin
-
Size
1.5MB
-
Sample
230507-c117ssee36
-
MD5
ee7c4bd45a126d25fd15813a8fc4b0ec
-
SHA1
596bbaa20c4ede65d8bc53c42b981f99423ca3fe
-
SHA256
5e972195a211083a7c091b8c1be68a4bd1e47ed5204a92b6670bb8625af9d2c4
-
SHA512
8a8125c6839e1c5d92618c4d2cf9893f267d88c5c143b8b89c34f5ea359ac9ed0379dfa321b0f8081f96e7e1f10436f55c546e3a2c62be80b70ed0ac14db6a25
-
SSDEEP
24576:nyIS0A7WczZ54KiBPo6ttwes2f4uBrpMjUoZlbnUp5O+gHVPu4FZv0QbXR:yIS0A7WczUbo0tbsQrpMffrUb76G4F1v
Static task
static1
Behavioral task
behavioral1
Sample
5e972195a211083a7c091b8c1be68a4bd1e47ed5204a92b6670bb8625af9d2c4.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5e972195a211083a7c091b8c1be68a4bd1e47ed5204a92b6670bb8625af9d2c4.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
most
185.161.248.73:4164
-
auth_value
7da4dfa153f2919e617aa016f7c36008
Targets
-
-
Target
5e972195a211083a7c091b8c1be68a4bd1e47ed5204a92b6670bb8625af9d2c4.bin
-
Size
1.5MB
-
MD5
ee7c4bd45a126d25fd15813a8fc4b0ec
-
SHA1
596bbaa20c4ede65d8bc53c42b981f99423ca3fe
-
SHA256
5e972195a211083a7c091b8c1be68a4bd1e47ed5204a92b6670bb8625af9d2c4
-
SHA512
8a8125c6839e1c5d92618c4d2cf9893f267d88c5c143b8b89c34f5ea359ac9ed0379dfa321b0f8081f96e7e1f10436f55c546e3a2c62be80b70ed0ac14db6a25
-
SSDEEP
24576:nyIS0A7WczZ54KiBPo6ttwes2f4uBrpMjUoZlbnUp5O+gHVPu4FZv0QbXR:yIS0A7WczUbo0tbsQrpMffrUb76G4F1v
-
Detects Redline Stealer samples
This rule detects the presence of Redline Stealer samples based on their unique strings.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-