General
-
Target
510853a18e433573897258a3d6cb3248a41d689ced8f3b497045d4f542d01f89
-
Size
1020KB
-
Sample
230523-c2fmgsde56
-
MD5
a49d00b3a318d4cbd17b200ecaefccb3
-
SHA1
a672afedd4bc2e884e3d347a79176e8c5d39e62d
-
SHA256
510853a18e433573897258a3d6cb3248a41d689ced8f3b497045d4f542d01f89
-
SHA512
cf643f5cc0992e33074dd0c29cba11545d6fa988f97dc95709c8593e28426858bd147bb71a5ed2d3726f835a4f7a2a4b4db4c6ecbfb5c51f06bc32694ffe189a
-
SSDEEP
24576:YyDbM2RtBr4zvAMbS1DJDfoAZNJ0qSA9bNKSA:fDbMC3JMb0xZv0+bNK
Static task
static1
Malware Config
Extracted
redline
luxa
77.91.68.157:19065
-
auth_value
2dda654f9abf47e50c7446be3ecc1806
Targets
-
-
Target
510853a18e433573897258a3d6cb3248a41d689ced8f3b497045d4f542d01f89
-
Size
1020KB
-
MD5
a49d00b3a318d4cbd17b200ecaefccb3
-
SHA1
a672afedd4bc2e884e3d347a79176e8c5d39e62d
-
SHA256
510853a18e433573897258a3d6cb3248a41d689ced8f3b497045d4f542d01f89
-
SHA512
cf643f5cc0992e33074dd0c29cba11545d6fa988f97dc95709c8593e28426858bd147bb71a5ed2d3726f835a4f7a2a4b4db4c6ecbfb5c51f06bc32694ffe189a
-
SSDEEP
24576:YyDbM2RtBr4zvAMbS1DJDfoAZNJ0qSA9bNKSA:fDbMC3JMb0xZv0+bNK
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
LoaderBot executable
-
XMRig Miner payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-