General
-
Target
f1c442f87d3bd4c77de9840183c2a6987b96461b01c8c990f959bb945ad638ce
-
Size
1020KB
-
Sample
230523-cnyk5sec7y
-
MD5
741fbf21903f1521ccce5e91abbe34be
-
SHA1
bb28542eed0ab70bf3a01f97cd00ab3c00714fb4
-
SHA256
f1c442f87d3bd4c77de9840183c2a6987b96461b01c8c990f959bb945ad638ce
-
SHA512
2d20a9374a1396e2bfb8dffd68ae9d99bdbac50b5695242bdaa1f93b3e2a8e81963aa8c6acb8e337b212aac0fbff2153a53f5fbbc42e1afe30637993c48c17f8
-
SSDEEP
24576:Gyvpa13VZKVF/OjVoFZQMvDtnJdGESlWRws+ZXGLYjWxbhSuj9Y44K:Vvk3VmOjVSZ9QliMXG6WxVt244
Static task
static1
Malware Config
Extracted
redline
luxa
77.91.68.157:19065
-
auth_value
2dda654f9abf47e50c7446be3ecc1806
Targets
-
-
Target
f1c442f87d3bd4c77de9840183c2a6987b96461b01c8c990f959bb945ad638ce
-
Size
1020KB
-
MD5
741fbf21903f1521ccce5e91abbe34be
-
SHA1
bb28542eed0ab70bf3a01f97cd00ab3c00714fb4
-
SHA256
f1c442f87d3bd4c77de9840183c2a6987b96461b01c8c990f959bb945ad638ce
-
SHA512
2d20a9374a1396e2bfb8dffd68ae9d99bdbac50b5695242bdaa1f93b3e2a8e81963aa8c6acb8e337b212aac0fbff2153a53f5fbbc42e1afe30637993c48c17f8
-
SSDEEP
24576:Gyvpa13VZKVF/OjVoFZQMvDtnJdGESlWRws+ZXGLYjWxbhSuj9Y44K:Vvk3VmOjVSZ9QliMXG6WxVt244
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
LoaderBot executable
-
XMRig Miner payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-