General
-
Target
e1b4a60548d108809f53c5b827cf4e4e3782c4bd56feb4880d28a008a7cb3131
-
Size
1021KB
-
Sample
230523-cqr65sde26
-
MD5
fc2fa984746378094fd8e4a732c9d932
-
SHA1
a6423b636c49f3c8b613fadf808d54a1d8a34a78
-
SHA256
e1b4a60548d108809f53c5b827cf4e4e3782c4bd56feb4880d28a008a7cb3131
-
SHA512
6298a88291d41d3ad2c139f740772e2a4ee6cac4c3b64d88a3d0832543a4d8e2c6700809671f30bd0274418d26c5e1ab07360afc335a8dc8ef39c425e49d1caf
-
SSDEEP
24576:mypXPykpvsO+v6xr/DtcURSx/Ykz+2w9f1T:1JFRfJm/Yk7w9f
Static task
static1
Malware Config
Extracted
redline
luxa
77.91.68.157:19065
-
auth_value
2dda654f9abf47e50c7446be3ecc1806
Targets
-
-
Target
e1b4a60548d108809f53c5b827cf4e4e3782c4bd56feb4880d28a008a7cb3131
-
Size
1021KB
-
MD5
fc2fa984746378094fd8e4a732c9d932
-
SHA1
a6423b636c49f3c8b613fadf808d54a1d8a34a78
-
SHA256
e1b4a60548d108809f53c5b827cf4e4e3782c4bd56feb4880d28a008a7cb3131
-
SHA512
6298a88291d41d3ad2c139f740772e2a4ee6cac4c3b64d88a3d0832543a4d8e2c6700809671f30bd0274418d26c5e1ab07360afc335a8dc8ef39c425e49d1caf
-
SSDEEP
24576:mypXPykpvsO+v6xr/DtcURSx/Ykz+2w9f1T:1JFRfJm/Yk7w9f
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
LoaderBot executable
-
XMRig Miner payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-