General
-
Target
eeb8aa6df6eda9ee6e2f1a0442fbbb6b57bf471d6c58eddcac00845ad5c24510.exe
-
Size
1.1MB
-
Sample
230514-xabjnsfc6s
-
MD5
8f1f8eaf0488cf2110f4bbff3766fc03
-
SHA1
c750ba51489eca23c3515e88385cd0bc8d66660e
-
SHA256
eeb8aa6df6eda9ee6e2f1a0442fbbb6b57bf471d6c58eddcac00845ad5c24510
-
SHA512
6d366a89f30db672b1d0bc477fa9e28c0c31dff4884457d3181aa01b4da692d35c0d273fcd0300414045bc3db7edfa8a6c8b2fc50bc8b8f4d3cf302cf1560d0c
-
SSDEEP
24576:0yW9TIlYc0KZ6IvYkGl/lSAL0eAB9LFCY:DW9TIlYNCYkGl/MU07xC
Static task
static1
Behavioral task
behavioral1
Sample
eeb8aa6df6eda9ee6e2f1a0442fbbb6b57bf471d6c58eddcac00845ad5c24510.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
eeb8aa6df6eda9ee6e2f1a0442fbbb6b57bf471d6c58eddcac00845ad5c24510.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
dogma
185.161.248.75:4132
-
auth_value
d6c5d36e9aa03c956dc76aa0fcbe3639
Extracted
redline
terra
185.161.248.75:4132
-
auth_value
60df3f535f8aa4e264f78041983592d2
Targets
-
-
Target
eeb8aa6df6eda9ee6e2f1a0442fbbb6b57bf471d6c58eddcac00845ad5c24510.exe
-
Size
1.1MB
-
MD5
8f1f8eaf0488cf2110f4bbff3766fc03
-
SHA1
c750ba51489eca23c3515e88385cd0bc8d66660e
-
SHA256
eeb8aa6df6eda9ee6e2f1a0442fbbb6b57bf471d6c58eddcac00845ad5c24510
-
SHA512
6d366a89f30db672b1d0bc477fa9e28c0c31dff4884457d3181aa01b4da692d35c0d273fcd0300414045bc3db7edfa8a6c8b2fc50bc8b8f4d3cf302cf1560d0c
-
SSDEEP
24576:0yW9TIlYc0KZ6IvYkGl/lSAL0eAB9LFCY:DW9TIlYNCYkGl/MU07xC
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-