General
-
Target
322f0b61a1856221c92bd583b7ff7e2914e778d16719c163aa2a5b27061011c1
-
Size
1.1MB
-
Sample
230514-acrx4scd4y
-
MD5
d40b09a25229b05ed30db68346ca20cc
-
SHA1
8b37fd8e51836b20e84c4c49797023600ec3782a
-
SHA256
322f0b61a1856221c92bd583b7ff7e2914e778d16719c163aa2a5b27061011c1
-
SHA512
695c7941df18a2db0d37d100154574e8fe9135ba314c265dd6e450cfcf2b28106af7e5d1c891793b8a922124d3b3194b7fbe2a9b31e4f3785862af3c211b30b3
-
SSDEEP
24576:NygdgwJU80Ba2n7me0wj9395ENjd13bekr3F4S75Hg3KC+fW7gXO4vYmK:oCHBi7gwj93gNj+kr1pkKJfJOc
Static task
static1
Behavioral task
behavioral1
Sample
322f0b61a1856221c92bd583b7ff7e2914e778d16719c163aa2a5b27061011c1.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dogma
185.161.248.75:4132
-
auth_value
d6c5d36e9aa03c956dc76aa0fcbe3639
Extracted
redline
terra
185.161.248.75:4132
-
auth_value
60df3f535f8aa4e264f78041983592d2
Targets
-
-
Target
322f0b61a1856221c92bd583b7ff7e2914e778d16719c163aa2a5b27061011c1
-
Size
1.1MB
-
MD5
d40b09a25229b05ed30db68346ca20cc
-
SHA1
8b37fd8e51836b20e84c4c49797023600ec3782a
-
SHA256
322f0b61a1856221c92bd583b7ff7e2914e778d16719c163aa2a5b27061011c1
-
SHA512
695c7941df18a2db0d37d100154574e8fe9135ba314c265dd6e450cfcf2b28106af7e5d1c891793b8a922124d3b3194b7fbe2a9b31e4f3785862af3c211b30b3
-
SSDEEP
24576:NygdgwJU80Ba2n7me0wj9395ENjd13bekr3F4S75Hg3KC+fW7gXO4vYmK:oCHBi7gwj93gNj+kr1pkKJfJOc
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-