General
-
Target
debeae477e24ed5b0a3dd6feedbaaf7ba66578da4240753b3a8de5849ec6ca21.exe
-
Size
1.1MB
-
Sample
230514-w88rdsda34
-
MD5
1ced96a4310bbe719fbf608b1de7dcf8
-
SHA1
1a57f36f0171c4f098b7eb0aa197a22c28f35451
-
SHA256
debeae477e24ed5b0a3dd6feedbaaf7ba66578da4240753b3a8de5849ec6ca21
-
SHA512
188cd8f87cf33c5ab68ee8ae6173ced61044b2d02afa7998a560e93b5278d71644d5eb03786a02c3a6617b254d84b9e4a250ba8c2497d313c57d46574cf5b460
-
SSDEEP
24576:1yUwCaAUTjRbLGLYEsKzDjT1V1YW82Zzp2hRA6b:QUwCqLGLy83T1LYWnZzs
Static task
static1
Behavioral task
behavioral1
Sample
debeae477e24ed5b0a3dd6feedbaaf7ba66578da4240753b3a8de5849ec6ca21.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
debeae477e24ed5b0a3dd6feedbaaf7ba66578da4240753b3a8de5849ec6ca21.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dogma
185.161.248.75:4132
-
auth_value
d6c5d36e9aa03c956dc76aa0fcbe3639
Extracted
redline
terra
185.161.248.75:4132
-
auth_value
60df3f535f8aa4e264f78041983592d2
Targets
-
-
Target
debeae477e24ed5b0a3dd6feedbaaf7ba66578da4240753b3a8de5849ec6ca21.exe
-
Size
1.1MB
-
MD5
1ced96a4310bbe719fbf608b1de7dcf8
-
SHA1
1a57f36f0171c4f098b7eb0aa197a22c28f35451
-
SHA256
debeae477e24ed5b0a3dd6feedbaaf7ba66578da4240753b3a8de5849ec6ca21
-
SHA512
188cd8f87cf33c5ab68ee8ae6173ced61044b2d02afa7998a560e93b5278d71644d5eb03786a02c3a6617b254d84b9e4a250ba8c2497d313c57d46574cf5b460
-
SSDEEP
24576:1yUwCaAUTjRbLGLYEsKzDjT1V1YW82Zzp2hRA6b:QUwCqLGLy83T1LYWnZzs
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-