General
-
Target
fdd3e26a7c57589b8bfe4608116eb7339edea9b6276af99785a5b2f19b4a5ded
-
Size
1.7MB
-
Sample
230507-kvsbpsee2z
-
MD5
94d324353471874ed322a0e82d054142
-
SHA1
166d3fbe76a8884cdd322b75b8a6273bc05829eb
-
SHA256
fdd3e26a7c57589b8bfe4608116eb7339edea9b6276af99785a5b2f19b4a5ded
-
SHA512
923a5a46fd1b0dbaaa936850a2eef88d21f0ff80e0d4751bf13974dccbd0fde940c4a50eb7b7b3e5c2d0f76ad26246823461546b13434d0372a859f846014ab4
-
SSDEEP
24576:eyGW+sua+VUhd5eYtZrLqSGhN06b7Pz6dhJApWwLqUaDnT66KP2qXBkmlX/:tv+g+VUX55tdLox7+d7Em63pxkmlX
Static task
static1
Behavioral task
behavioral1
Sample
fdd3e26a7c57589b8bfe4608116eb7339edea9b6276af99785a5b2f19b4a5ded.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
fdd3e26a7c57589b8bfe4608116eb7339edea9b6276af99785a5b2f19b4a5ded.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
most
185.161.248.73:4164
-
auth_value
7da4dfa153f2919e617aa016f7c36008
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Targets
-
-
Target
fdd3e26a7c57589b8bfe4608116eb7339edea9b6276af99785a5b2f19b4a5ded
-
Size
1.7MB
-
MD5
94d324353471874ed322a0e82d054142
-
SHA1
166d3fbe76a8884cdd322b75b8a6273bc05829eb
-
SHA256
fdd3e26a7c57589b8bfe4608116eb7339edea9b6276af99785a5b2f19b4a5ded
-
SHA512
923a5a46fd1b0dbaaa936850a2eef88d21f0ff80e0d4751bf13974dccbd0fde940c4a50eb7b7b3e5c2d0f76ad26246823461546b13434d0372a859f846014ab4
-
SSDEEP
24576:eyGW+sua+VUhd5eYtZrLqSGhN06b7Pz6dhJApWwLqUaDnT66KP2qXBkmlX/:tv+g+VUX55tdLox7+d7Em63pxkmlX
-
Detects Redline Stealer samples
This rule detects the presence of Redline Stealer samples based on their unique strings.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-