General
-
Target
49883d026fb595c0243e0deb509e7bb534f54b10e6fa2567695a3937d31ff840
-
Size
1020KB
-
Sample
230523-hm1a8sfa6v
-
MD5
7405d40eeb9e5c190ea52d2fe22c4ade
-
SHA1
831e57887e29a5217b7a382666d7a7ce7a9a1651
-
SHA256
49883d026fb595c0243e0deb509e7bb534f54b10e6fa2567695a3937d31ff840
-
SHA512
1be5a4eb2610048396fee84996d74b73538d5b0702391728fad90ca15530bf2069ef80338fface02aec9d9842d7e258dafd8e69bf5bc60e54c043d7814d18d45
-
SSDEEP
24576:4yCk0Xxjij3IvWo1Z7hxXrem3LniPptz9kWgsEcI:/YBjiVqZ1xXv3rOvz6P
Static task
static1
Malware Config
Extracted
redline
luxa
77.91.68.157:19065
-
auth_value
2dda654f9abf47e50c7446be3ecc1806
Targets
-
-
Target
49883d026fb595c0243e0deb509e7bb534f54b10e6fa2567695a3937d31ff840
-
Size
1020KB
-
MD5
7405d40eeb9e5c190ea52d2fe22c4ade
-
SHA1
831e57887e29a5217b7a382666d7a7ce7a9a1651
-
SHA256
49883d026fb595c0243e0deb509e7bb534f54b10e6fa2567695a3937d31ff840
-
SHA512
1be5a4eb2610048396fee84996d74b73538d5b0702391728fad90ca15530bf2069ef80338fface02aec9d9842d7e258dafd8e69bf5bc60e54c043d7814d18d45
-
SSDEEP
24576:4yCk0Xxjij3IvWo1Z7hxXrem3LniPptz9kWgsEcI:/YBjiVqZ1xXv3rOvz6P
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
LoaderBot executable
-
XMRig Miner payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-